Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Part 2: What cybersecurity measures can insurance companies and providers take to thwart cyberattacks like ransomware

As discussed in the previous blog, the insurance sector, like other financial institutions, face various unique cybersecurity challenges. Of primary concern is its responsibility for safeguarding sensitive customer data. This data has long been a prime target for cybercrime — a trend that has endured even as today’s IT landscape, and the threats against it, continue to evolve.

Comparing NGFW container firewalls with Calico container firewall

In my previous blog post, I touched upon some challenges with how NGFW container firewalls are built and how it takes a team of firewall specialists to deploy, configure and maintain the firewall platform. In this blog I will illustrate the challenges in detail and demonstrate the simplicity of the Calico container firewall platform.

RKVST is now DataTrails! #shorts

We've listened, we've learned, and the market has definitely spoken! Our old name just wasn't working: it was hard to pronounce, hard to spell, and hard to understand what we do. Even if the ‘archivist' leap was made it didn't carry our special mission with it. At the same time, our customers are increasingly telling us that what we do best is help them build immutable audit trails for all their business data: documents, files, images and other types of digital content.

The Ultimate Guide to Password Best Practices: Guarding Your Digital Identity

In the wake of escalating cyber-attacks and data breaches, the ubiquitous advice of “don’t share your password” is no longer enough. Passwords remain the primary keys to our most important digital assets, so following password security best practices is more critical than ever. Whether you’re securing email, networks, or individual user accounts, following password best practices can help protect your sensitive information from cyber threats.

How Telecom Providers Can Bolster Identity Security to Meet the UK TSA

As technology evolves, so do the threats that loom over our communication infrastructure. The rollout of 5G, the rise of artificial intelligence (AI) and our ongoing dependence on these networks combine to make the telecommunications industry a prime target for cyberattacks.

The Benefits of Using a Unified Platform for Incident Response

In today's rapidly changing cybersecurity landscape, swift and effective incident response is pivotal. Traditional incident response approaches, involving disparate tools and isolated processes, have proven inadequate to the task. That's where unified platforms come into play—a comprehensive approach to incident response that streamlines and centralizes the entire process.

Random but Memorable - Episode 11.8: Wrong Movie Airplane Tampering with Ken Munro

We're taking a trip to the movies this episode.🍿 With people speaking with ChatGPT for hours, are we bringing 2013’s sci-fi movie Her closer to reality? And can we really hack airplanes like that iconic scene in Die Hard 2? We unpack all that and more. We're also excited to welcome back friend-of-the-show, Ken Munro, from Pen Test Partners. Ken shares his latest wild discoveries pen-testing airplane security during the pandemic.🔒✈️