Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Online purchase scams spike since the start of COVID-19, reports BBB

Scams occurring during online purchases have spiked since the start of the pandemic, as reported in new research conducted by the Better Business Bureau (BBB). Around 80.5% of consumers who reported this type of scam this year lost money, compared to 71.2% in 2015. Online purchasers scams have been among the three riskiest scams for the past three years but the situation has become significantly more severe in 2020.

Top cyber security stats you need to know for 2021

Bulletproof has released its Annual Cyber Security Industry Report 2021, where we look at the security challenges facing businesses in 2021 and discover what organisations can do to stay ahead of the hackers. In this blog we highlight 4 key findings from the report and explore what they mean for business’ security in 2021 and beyond.

White Box Testing Guide

The ultimate objective of any software developer is to create performant, secure, and usable applications. Realizing this goal requires every application to be tested thoroughly. Testing is therefore a critical aspect of creating robust applications. It’s what ensures the developed software meets the desired quality expectations. This blog examines one of the vital testing methods: white box penetration testing.

SASE and the Forces Shaping Digital Transformation Part 2: Organizational Culture & Adversaries and Threats

At the convergence of digital transformation, an industry-wide focus on SASE, and the effects of the continuing COVID-19 pandemic, there are key forces that security practitioners need to be aware of and operate within. This is the second blog in a series of three detailing these forces and how security leaders and practitioners can adapt to them in a digitally transforming, SASE-enabled world. This blog covers the forces of Organizational Culture and Adversaries and Threats.

Beyond Certification: Rethinking Training for Security Analysts

When we talk about training security analysts, you probably immediately think about earning certifications such as CFCE or OSCP. This year’s Devo SOC Performance ReportTM found that among survey respondents who don’t consider their SOC to be a high performer, only 31% of those organizations have a defined program for training analysts. While practical skills are vital in the SOC, they’re not the end-all, be-all of reaching the next career level.

Scalper Bots Target Retailers for PS5 and Xbox Series X

Scalper bots, also known as inventory hoarding bots, are the bots that thrive on supply and demand. These malicious bots are used to target merchandise that is typically in high demand or limited supply, buying it and selling it on for a tidy profit. The key thing here, is that scalper bots can make purchases extraordinarily quickly, much faster than any genuine user can.

What should retailers expect from the 2020 holiday season?

No one could have predicted how 2020 would unfold, particularly for the retail industry. While some high street stores, including major brands, have been forced to close, other retailers have navigated surges of consumers heading online and fueling the eCommerce industry like never before. The holiday period is vital for retailers, with trading figures from November to December able to make or break a businesses’ annual profit margin.

How to cyber security: Gotta go fast ... but why?

DevSecOps allows organizations to deliver applications at a high velocity using iteration and automation to better serve customers. Velocity is one of the pillars of DevSecOps. Through the magic of automation, DevSecOps teams can achieve impressively short timespans between when developers make changes in code and when those changes are deployed.

The Netflix streaming model can obviate your employee's computer security

Someone you don’t know walks into your office and sits down at a computer. Maybe that computer is a corporate desktop assigned to a mid-level manager or to a member of your IT department. Maybe it’s a personally owned laptop used by a contractor. That unknown person plugs a USB dongle into that computer, installs some software (typing in the correct password, if requested), runs that software, and walks away. No problem, right?