Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

What is MIME in Network Security?

MIME (abbreviation for Multipurpose Internet Mail Extentions) is a worldwide standard introduced in 1991. In this article, we will discuss what it is and why it is important. As the technology introduces new ways to communicate and conduct business, our business operations become much more reliant on the data transfer and the Internet itself.

Understanding Single Sign On as a Means of Identity Access Management

I usually spend my mornings doing some reading and enjoying my coffee. On this one particular morning, I noticed that I had received an email from a gaming company I had created an account with around 10 years ago for my kids. They had sent me a code to confirm a login that was being done from Thailand. I had forgotten that I had even created the account. The account used a set of my credentials that had been compromised many years ago in one of the many data breaches that occur on a continuous basis.

Why OPSEC Is For Everyone, Not Just For People With Something To Hide - Part III

In this final part of the series, I discuss why everyone should consider reviewing their OPSEC (Operations Security), not just those with something to hide. If you haven’t read the previous articles then please check them out first (Part I & Part II), as they provide key background information about the techniques discussed in this post.

Everything you need to know about a DPO

In 2018, the world’s trust was shaken. That year, it was revealed that Cambridge Analytica had furtively harvested data left exposed by Facebook. The information of over 87 million individuals was exploited to assemble voter profiles and customise the distribution of political advertisements in the run up to the 2016 US Presidential Election as well as Brexit.

How important is network compliance for your remote work environment?

With a majority of the workforce now adopting a work-from-home routine, maintaining the normal functioning of your network and ensuring compliance with industry standards is not an easy job. When employees are working remotely, it is especially crucial to ensure network compliance with industry standards and internal policies to secure your network from cybersecurity breaches.

Cyber Security for Industrial Control Systems

It is no secret that humans make mistakes. In order to reduce the damages and harms caused by human error, cyber security is a must for industrial control systems. Keep reading to learn more. Unfortunately, humans make mistakes. There are many reasons behind this fact, such as the limited capacity of our working memory or our short attention span. Regardless of our experience, no matter how well trained we are, we all make mistakes, and it is okay. Mostly.

Detecting, Reporting and Mitigating Vulnerabilities for Go Modules

Go Module vulnerabilities frustrate the lives of many Go developers and can turn a simple project into a battle of endurance between the dev and their patience. With the process of CI/CD shifting left more and more, it’s becoming even more pertinent for developers to be able to track and report vulnerabilities as early as possible. JFrog GoCenter can help track and mitigate vulnerabilities and make the lives of Go developers easier.

The importance and security concerns of staying connected during the COVID-19 pandemic

Unsplash The COVID-19 pandemic sweeping the globe has effectively put a stop to the bulk of face-to-face interactions. With social distancing and shelter in place orders in effect, people are stuck at home and relying on the Internet as not only a tool for communication and entertainment but as their only way to earn money during this hectic and uncertain time.