Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Exploring Sustainability In Electronic Manufacturing

While the electronics industry has become a cornerstone in modern technological advancement, the environmental footprint accompanying it now presents a critical challenge that calls for comprehensive and innovative approaches to sustainability. Electronic manufacturing encompasses a complex web of elements: materials and supply chains with important implications for global ecological systems, resource consumption and long-term environmental health.

How to develop and secure Cloud apps?

How can businesses build cloud applications that are both reliable and secure? Organizations face a dual challenge: they must develop scalable solutions and protect sensitive data. As more businesses migrate to cloud-based infrastructures, they must adopt strong cloud solutions development and security practices. These steps help them maintain operations and preserve customer trust. In this article, we guide you through proven strategies and best practices. We show how you select the right architecture and implement advanced security measures.
Featured Post

Navigating the Evolving Threat Intelligence Landscape and Organisational Responsibility

Cyber Rhino Threat Week (which took place from 9th to 13th December 2024) aims to inform, sharing threat intelligence insights and best practices with our customers, partners and industry ecosystem. This keynote session certainly set the stage for the week, exploring the complexities that organisations must consider when establishing and operating an effective Cyber Threat Intelligence (CTI) program. The panel discussion examined how diverse organisational structures, responsibilities, priorities, and desired outcomes influence the role and integration of CTI.

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

In a surprising development, Bumblebee Malware (a popular malware downloader) has resurfaced with an approach that was believed to be long gone: VBA macro-enabled documents. This comes just four months after Europol dismantled various trick bots—including Bumblebee, IcedId, Pikabot, TrickBot and systemBC—during a crackdown called Operation Endgame.

Proactive cybersecurity leadership: Implementing the NIST Cybersecurity Framework (CSF)

According to a recent Gartner report, 88% of boards view cybersecurity as a business risk, not just an IT issue, underscoring the critical need for organizations to adopt robust, scalable frameworks to manage cybersecurity risks. In today’s rapidly evolving threat landscape, frameworks like the NIST Cybersecurity Framework (CSF) are pivotal for safeguarding organizations from vulnerabilities while maintaining alignment with business objectives.

"Q&A: Digital Threats Landscape" with Joseph Menn

Join us for an insightful conversation with Joseph Menn, veteran cybersecurity reporter for the Washington Post and author of "Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World." In this closing keynote discussion, Menn shares his perspectives on the evolution of cybersecurity, exploring the complex relationship between technology advancement and security.