Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Detectify security updates for 23 January

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security researchers and Crowdsource ethical hacker community. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. This post highlights a few things that we have improved in the last two weeks.

Web Hosting Security Best Practices

If you’ve been online recently, you may have read the news about hackers demanding a ransom from Dublin’s tram system. Visitors to the Luas website were greeted by the hackers’ message threatening to publish the stolen information unless they were paid one Bitcoin (approximately 3,300 Euros or US $3,800). While the message itself appeared to be harmless, the fact is that the hackers could just as easily have used the domain to spread malware or phishing attempts.

Ignyte - GRC Company for Cybersecurity Receives Funding

January 15, 2019 Miamisburg, OH – Ignyte Assurance PlatformTM, an industry leader in managing governance, risk and compliance (GRC), has received $100,000 from the state of Ohio to develop and integrate cybersecurity technology from the Air Force Research Laboratory. The company will use the funding to develop and integrate cybersecurity technology from the Air Force Research Laboratory to improve data collection and analysis.

COBIT 2019 Audit Checklist

The alphabet soup of cybersecurity includes standards and regulations such as ISO, COBIT, COSO, NIST, NY DFS, and GDPR. While some industries must meet regulatory compliance requirements, other businesses need to choose a standard to which they align their cybersecurity controls. With that in mind, you may want to select the most user-friendly information technology security standard to help management and your IT department create a risk-based program.

Federal Cybersecurity Posture "Untenable," According to OMB Risk Report

When he issued Executive Order 13800 (EO 13800) on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, President Trump’s goal was to highlight that security and public accountability of government officials are foundational pillars while emphasizing the importance of reducing cybersecurity risks to the Nation.

Benefits of a Secure Software Development Life Cycle (SDLC)

The software development life cycle abbreviated SDLC, is a term used for the process of developing, altering, maintaining, and replacing a software system. SDLC is comprised of several different phases, including planning, design, building, testing, and deployment. In Secure SDLC, security assurance is practiced within in each developmental phase of the SDLC. Throughout each phase, either penetration testing, code review, or architecture analysis is performed to ensure safe practices.

Perpetrated by Employees and Managers Already Inside Companies

KPMG’s Fraud Barometer Says Most Crime is Perpetrated by Employees and Managers Already Inside Companies. The introspective look at the UK’s £1.2 billion in 2018 fraud cases by KPMG demonstrates the need to be mindful of insiders. Each year, professional services company KMPG puts out their annual Fraud Barometer report, providing readers with the state of corporate fraud.

Incident Response Steps Comparison Guide

What is Incident Response? It’s a plan for responding to a cybersecurity incident methodically. If an incident is nefarious, steps are taken to quickly contain, minimize, and learn from the damage. Not every cybersecurity event is serious enough to warrant investigation. Events, like a single login failure from an employee on premises, are good to be aware of when occurring as isolated incidents, but don’t require man hours to investigate.