Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Corelight launches the Entity Collection

Corelight Labs, our amazing research team, has been hard at work on another content collection which we are excited to introduce: the Corelight Entity Collection. Corelight evidence is powerful and comprehensive. So comprehensive, in fact, that it can sometimes be hard to know where to start. Providing customers faster ways to find meaningful context in our data was the driving force behind the creation of the Entity Collection.

A Complete Guide on Comodo EV Code Signing Certificate

EV Code Signing Certificate resides at the top of the digital certificate hierarchy due to its enormous security functionalities. Organizations active for a minimum of three years can only obtain it by undergoing a strict validation process. In addition, Certificate Authorities perform a rigorous verification of all documents before issuing the EV Code Signing Certificate.

How Did Someone Guess My Password?

Finding out that someone has guessed your password can be a scary feeling. Passwords protect your important data, so having someone guess it is a major threat to your security. There are several ways someone could have guessed your password including having bad password habits and easy-to-guess security questions. Read on to learn more about password guessing and the steps you can take to avoid it from happening to your accounts.

Why Passport Verification is key to Secure Housing & other Industries

Passport verification is a process that is used to confirm a person’s identity using their passport as proof of identification. In the housing industry, this process is commonly used to verify the identity of prospective tenants or buyers before they are allowed to rent or purchase a property. This is often done as part of the overall background check process to ensure that the person is who they claim to be and to protect against fraud or other illegal activities.

5 Best Private and Secure Internet Web Browsers to Replace Chrome With

Your internet browser is the interface you use to access the internet. As such, it knows and handles a lot of your data. Unfortunately, browsers are also data collection tools for advertisers and marketers. They track your web activities to monetize you through their advertising partners with targeted ads. Also, let’s not forget the cybercriminals looking for data to steal. Most browsers store your browsing history. Also, cookies and trackers in the browsers monitor your every digital footprint.

CISO interview with Darren Desmond, the CISO with the Automobile Association in the UK

Philip Ingram (PI) talked to Darren Desmond (DD). Darren currently works with the Automobile Association (AA) in the UK as the Chief Information Security Officer (CISO), joining in 2018. He started his professional career in the British Army's Royal Military Police, before a stint in the Special Investigation Branch, and Military Intelligence.

Azure Bicep security fundamentals

Azure Bicep is getting more popular by the day and is rapidly becoming the replacement for Azure Resource Manager (ARM) templates. In this post, I am going to go over some security fundamentals when using Bicep. If you are not familiar with Bicep then I recommend taking a look at the Microsoft Learn documentation to find out more.

GDPR Compliance for Email Marketing and Cold-Callings

Cold calling and emailing have always been popular and effective techniques of sales and communication with prospective clients. It is a way how brands can reach out to potential clients who may not be aware of your service or product offerings. It is a technique of creating brand awareness and lead generation. However, many customers see these activities as spamming.

Cyberint Mentioned in Three 2022 Gartner Reports

We are proud to announce that Cyberint has been named a Sample Vendor in the ‘Hype Cycle for Security Operations, 2022’ under three categories: Digital Risk Protection Services; External Attack Surface Management and Threat Intelligence Products & Services. Cyberint has also been named in 2022 Gartner reports ‘Emerging Tech Impact Radar: Security’ and ‘Emerging Tech: Adoption Growth Insights in Digital Risk Protection Services’.