Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Splunk Data Stream Processor & Splunk Phantom - The Need For Speed

What is the benefit of combining the power of Data Stream Processor (DSP) and Splunk Phantom? I will give you a hint - the answer involves speed and extensibility. In today's security landscape, speed to detect and mitigate security attacks or outages is of the utmost importance. A slow response to a security incident can have a detrimental impact to your organization's bottom line.

CISA Strategy for 5G Security and Resilience

In August 2020, the Cybersecurity and Infrastructure Security Agency (CISA) released its strategy to ensure the security and resilience of 5G infrastructure in the United States. Roughly every 10 years, the next generation of mobile communication networks is released, bringing faster speeds and increased capabilities.

Weekly Cyber Security News 06/11/2020

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24.. I have always wondered what would happen if they were to call a victim with a little more clout. Shame the police advise to not actually engage with them, and as the comments go, where is the fun in that? I would probably go with the advice after personal experience.

Top 5 WFH Security Risks - and How to Avoid Them

IT leaders are being kept up at night by one big worry: the increased risk of a data breach due to more employees working remotely. Forty percent say this is their top concern when it comes to remote work. And with good reason. Remote work, especially when accelerated by events like COVID-19 pandemic, compels employees to work on unsanctioned devices, apps, and networks, increasing the attack surface for bad actors, and leaving few checks in place for careless behavior that leads to data leaks.

5 Best Tools for Secure Data Transfer

In 2018, it was estimated that more than 20 million people share files each day across a variety of platforms. Since the rise of remote work, that number has only skyrocketed. Every time your business shares a file internally, with a business partner, or to the public, the risk of that data falling into the wrong hands increases.

INETCO Recognized as a Leader in Payment Fraud Detection Solutions by Welp Magazine

Fraud is something that occurs every day across a variety of industries, causing trillions in losses each year. Hardest hit are the financial services and banking industries. In a recent article, Welp Magazine shared its top 13 picks for the best fraud detection startups. INETCO was extremely happy to be featured as a part of this list – selected for its innovative product and exceptional growth strategy.

Employee Monitoring For the Remote Workforce

Remote work has become increasingly popular over the last several years. But in 2020, the number of remote workers grew exponentially as a result of the coronavirus pandemic. Even though the lockdowns have ended, many companies have allowed their employees to continue working remotely. According to Gallup, 33% of workers in the U.S. are working remotely all the time and 25% of workers are working remotely at least some of the time.

Detecting Data Exfiltration Via the Use of SNICat

I used to have a cat who loved ice cream. I think I may have given her some as a kitten, and from then on, anytime that she saw someone eating ice cream she would do her best to try and steal some from them. And even if she didn’t really seem to enjoy a particular flavor, she still seemed driven to try and steal that person’s ice cream. Like my cat stealing ice cream, bad guys are constantly trying to target organizations and their data for nefarious purposes.

Port scanner 101: What it is and why should you use it

In today’s complex network infrastructure comprised of diverse resources, devices, and users, port scans represent a significant amount of network traffic. Crackers and hackers alike use port scanners to discover port vulnerabilities that can become attack vectors to malicious outcomes. In this post, we discuss the fundamentals of port scanning, and why you need to deploy an effective port scanner software on your network right now.