Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Glupteba and how can you protect your customers from this malware?

Over time, cybercriminals find ways to exploit new cybersecurity breaches, leading to the creation of malware that compromises users' security. Every year, one or more malware variants stand out as new, evasive, or dangerous. According to our Internet Security Report (ISR), last year it was Glupteba.

Stop Letting Security Audits Go to Waste-They're More Than Just a Checkbox Exercise

Over the past two decades, data has become a critical asset for nearly every organisation. Consequently, a variety of regulations and industry standards now govern business operations. In today’s data-driven age, certification through security audits serves as a testament to an organisation’s adherence to industry standards, regulations, and security measures.

OT Security Risk: Where Is It? What Can Be Done?

For security professionals and CISOs, reading about operational technology (OT) security risk feels like nothing new. We know a lot of OT is insecure by design. Despite advisory warnings and perceptions around operational security air gaps, industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) are being targeted more frequently via digital assets on the network. Vulnerabilities in OT systems are not brand new.

Helping Smaller Reporting Companies Adhere to 8-K Regulations With CRQ

In March 2022, when the not-so-new-anymore SEC cybersecurity regulations were initially drafted, some argued that smaller reporting companies, defined by having a public float of less than $250 million or an annual revenue of less than $100 million, should be exempt, given the "outsized costs" they faced. Others proposed that these smaller organizations should have a longer disclosure deadline, helping to alleviate the chances of non-compliance.

Accelerating privacy and security in AI with Tines

At Tines, our mission is to power the world's most important workflows, and AI has recently become a huge part of that story. We currently have two AI-powered capabilities that enable teams to work faster, reduce barriers to entry, and spend more time on the fulfilling work that attracted them to their professions in the first place. But this is only possible because they trust that these features are private and secure by design.

Random but Memorable - Episode 13.0: Lift As You Climb with Adamaka Ajaelo from Self-eSTEM

How can we foster diversity and champion inclusivity in the cybersecurity industry? And how do we support and encourage more BIPOC women and girls to get into tech? Our final episode of the season invites Self-eSTEM founder, Adamaka Ajaelo, to have this important and inspiring conversation with 1Password Founder Sara Teare. We also dissect what looks to be turning into one of the largest data breaches ever, in Watchtower Weekly. Plus, we go out with a bang in our final game of Security Blank.

Passkeys vs Two-Factor Authentication (2FA): What's the Difference?

The main difference between passkeys and 2FA is that passkeys completely remove the need for individuals to enter a password, whereas 2FA enhances the security of an account by requiring an additional method of authentication in addition to a traditional username and password. Continue reading to learn more about the differences and similarities between passkeys and 2FA, and which is more secure.