Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

COVID-19 & Cyber Threats Report

As the ongoing COVID-19 (Coronavirus) pandemic spreads around the world, the unprecedented and evolving global situation has created numerous opportunities for threat actors to leverage the worldwide concern and anxiety in their nefarious campaigns. Cyberint Research is closely monitoring the cyber threats leveraging COVID-19 pandemic. As part of those activities, our team compiled a summary addressing the initial activities we detected.

Weekly Cyber Security News 27/03/2020

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. With all the wild stuff going on right now, and I don’t know if it’s cabin fever causing regression, but I seem to home in on some almost retro items of news this week. The first, not so much that they were hit by a card skimmer, more that I didn’t realise they were still with us.

Coronavirus: 10 Steps Employers Should Take to Maintain a Safe Workplace

As we’re actively in the throes of COVID-19, it’s understandable that workers and employees are uneasy about their safety and security on the job. Here are 10 steps employers need to take to keep your workplace safe in the face of a public health emergency.

CyberGRX vs UpGuard Comparison

Robust vendor risk management practices has never been more important. It is increasingly one of the top concerns of CISOs around the world. This is because outsourcing, digitization, and globalization have changed the way we do business over the last few decades. These forces have led to innovation in products and services, the ability to focus on core competencies, reduced costs, and new global markets.

The Future is Hybrid: Practicing Security in the Hybrid Cloud

By now, many organizations have adopted the cloud in some way. We saw organizations moving whole servers over to the cloud at the beginning, but now we see small parts of a system being moved to the cloud and new cloud native offerings. We’ll use the analogies of Lincoln Logs and Legos to describe these deployment models.

Third-party data breach exposes GE employees' personal information

Past and present employees of General Electric (GE) are learning that their sensitive information has been exposed by a data breach at a third-party service provider. Fortune 500 company GE says it was recently informed of a security breach at one of its partners, Canon Business Process Services.

Working Anywhere With Egnyte: Mobile Guide

In recent weeks, companies and organizations that ordinarily operate in a more “traditional” office environment have had to pivot quickly to flexible and alternative working arrangements. At Egnyte, our goal has always been to help provide safe, secure access to your content no matter where you are, and that goal has become increasingly more important in the current climate.