Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CyberInt - Argos Digital Risk Protection Platform

Recently recognized as one of the 20 most promising enterprise security solution providers for 2018 by CIOReview, CyberInt eliminates potential threats before they become crises by looking at all online activities and digital assets from an attacker’s perspective and provides managed detection and response services to customers worldwide. Leveraging Argos™ real-time digital risk protection platform with a global cyber expert analyst team, as well as managed SOC, threat hunting, deep dive investigations, real-time incident response and risk and business impact assessment services, CyberInt provides holistic end-to-end protection to digital businesses in retail, eCommerce, gaming and financial industries.

How SOAR helps a Security Operations Centre?

In the previous post, we discussed the basics of SOAR – Security Orchestration, Automation, and Response and how it is becoming a must-have for businesses across the globe. In this post, we will continue our discussion with how an SOAR solution can help an SOC in improvising its operations. Our experts have identified the following ways in which an SOAR solution proves to be beneficial for a business...

5 Digital Threats to Watch Out for on Black Friday

The end of November is a busy time in the United States. On Thanksgiving, friends and family gather together to give thanks for good food, good company and good fortune. Once they’ve put away the leftovers, many Americans don their coats, head to the malls and wait in line all night. For what? Black Friday, the commencement of the Christmas shopping season.

5 Reasons Why Your Business Needs Penetration Testing

Nowadays, high-profile security breaches continue to dominate the media headlines. This trend places an increasing number of businesses at risk. They are growing in amount and complexity while malicious hackers are actively developing new and more sophisticated forms of attacks every single day.

Cybersecurity Is (Still) Everyone's Job

As noted previously—and as we all know—an organization cannot be secure until the entire workforce is engaged in reducing cyber risks. Each member of the group has the power to harm or to help, since each one has access to information systems, handles sensitive data and makes decisions every day which maintain, erode or strengthen the human “attack surface” of the organization.

Vulnerability scans vs Penetration tests

You’ll often find that ‘vulnerability scan’ and ‘penetration test’ are wrongly used interchangeably, creating confusion about which is the right security choice for businesses. Broadly speaking, a vulnerability scan could be thought of as a surface-level security assessment, whereas a penetration test delves that much deeper. In fact, penetration testers often make use of a vulnerability scan as part of their process.

Weekly Cyber Security News 16/11/2018

A selection of this week’s more interesting vulnerability disclosures and cyber security news. Quite an interesting stream of news this week, however, my choices this week focus on threat management. The first one, and its quite alarming and not at all funny, shows an example of someone didn’t accept reasonable proof of account ownership for a password reset – something many of us face with public websites.