Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Redefining Personal Data: Understanding the EU General Court's Ruling on Pseudonymized Data

In a ruling made on April 26, 2023, the General Court of the European Union (EU) made a groundbreaking decision changing the definition of personal data that has been in place since the adoption of the General Data Protection Regulation (GDPR). This ruling has significant data-sharing implications for organizations within the EU and enables them to share data with third parties more easily, as long as it’s appropriately de-identified.

Reverse Engineering Flutter Apps: What You Need To Know?

Reverse engineering is one of the most notorious methods using which hackers exploit an application or software. If you're in the mobile app development industry and use Flutter for app development, you'd know the threat reverse engineering poses to apps. While 100% protection from reverse engineering isn't possible, you can give the hackers a tough time trying to exploit your app. And this blog is there to help.

Internet of Things and Cybersecurity: Emerging Trends, Challenges, and Solutions

The Internet of Things (IoT) has revolutionised various industries, from healthcare to automotive, and smart cities. With countless connected devices now managing critical operations, the need for robust cybersecurity measures has never been more crucial. As the IoT ecosystem continues to expand, new security risks and challenges emerge, demanding an in-depth understanding and effective strategies to address them.

IoT Device Management: A Comprehensive Guide for 2023

Imagine a world where managing thousands of connected devices is as easy as managing one. Welcome to the era of IoT device management! With the rapid growth of connected devices across various industries, IoT device management has become an essential aspect of maintaining security, efficiency, and scalability.

ManageEngine AD360 stands tall with wins at the 11th Global InfoSec Awards

The 11th annual Global InfoSec Awards, held at the RSA Conference 2023 in San Francisco, brought together over 4,300 companies vying for recognition in various categories. Among the standout performers, ManageEngine’s AD360 won prestigious accolades in four categories. Cyber Defense Magazine (CDM) hosted the Global InfoSec Awards, recognizing the most innovative and effective cybersecurity companies and products in the industry.

New Bytesafe Feature: SBOM import

We are excited to share a new Bytesafe feature that will help you manage and secure your supply chain: the ability to import Software Bill of Materials (SBOM) files into Bytesafe. This enhancement, designed with our users' needs in mind, is a significant stride towards improved software supply chain security. It offers a solution to track current and potential vulnerabilities in your dependencies without sharing your proprietary source code or other sensitive data.

Aadhaar Verification API: Unlocking the Potential of Aadhaar Plus

In the digital age, Aadhaar Plus has emerged as a powerful tool, revolutionizing identity verification and secure digital user onboarding processes. With its conveniently designed workflows, and efficiently integrated technology, Aadhaar Plus is reshaping the way we process digital identities and carry out Know-Your-Customer (KYC) processes in India. In this blog, we will explore the potential of Aadhaar Plus and how it is transforming various sectors.

Over 2 million Websites Vulnerable to XSS Exploit (CVE-2023-30777) in WordPress Plugin

A zero-day vulnerability, denoted by the CVE identifier CVE-2023-30777, exposes a dangerous reflected cross-site scripting (XSS) flaw. This high-severity vulnerability has been discovered within the WordPress plugin (Advanced Custom Fields (ACF) and Advanced Custom Fields Pro). The CVE-2023-30777 exposes over 2 million installations to security risks, triggering widespread concern and anxiety among website owners and administrators.

Free ISO 27001 Vendor Questionnaire Template (2023 Edition)

ISO 27001 is commonly used for assessing supply chain and data breach risks during due diligence. This post provides a free ISO 27001 vendor questionnaire template for a high-level evaluation of vendor information security standards. Though this security assessment template only broadly covers Supply Chain Risk Management aspects of ISO 27001, it should still be sufficient for identifying potential deficiencies in a vendor’s security control strategy requiring further investigation.