Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How to develop and secure Cloud apps?

How can businesses build cloud applications that are both reliable and secure? Organizations face a dual challenge: they must develop scalable solutions and protect sensitive data. As more businesses migrate to cloud-based infrastructures, they must adopt strong cloud solutions development and security practices. These steps help them maintain operations and preserve customer trust. In this article, we guide you through proven strategies and best practices. We show how you select the right architecture and implement advanced security measures.
Featured Post

Navigating the Evolving Threat Intelligence Landscape and Organisational Responsibility

Cyber Rhino Threat Week (which took place from 9th to 13th December 2024) aims to inform, sharing threat intelligence insights and best practices with our customers, partners and industry ecosystem. This keynote session certainly set the stage for the week, exploring the complexities that organisations must consider when establishing and operating an effective Cyber Threat Intelligence (CTI) program. The panel discussion examined how diverse organisational structures, responsibilities, priorities, and desired outcomes influence the role and integration of CTI.

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

In a surprising development, Bumblebee Malware (a popular malware downloader) has resurfaced with an approach that was believed to be long gone: VBA macro-enabled documents. This comes just four months after Europol dismantled various trick bots—including Bumblebee, IcedId, Pikabot, TrickBot and systemBC—during a crackdown called Operation Endgame.

Proactive cybersecurity leadership: Implementing the NIST Cybersecurity Framework (CSF)

According to a recent Gartner report, 88% of boards view cybersecurity as a business risk, not just an IT issue, underscoring the critical need for organizations to adopt robust, scalable frameworks to manage cybersecurity risks. In today’s rapidly evolving threat landscape, frameworks like the NIST Cybersecurity Framework (CSF) are pivotal for safeguarding organizations from vulnerabilities while maintaining alignment with business objectives.

"Q&A: Digital Threats Landscape" with Joseph Menn

Join us for an insightful conversation with Joseph Menn, veteran cybersecurity reporter for the Washington Post and author of "Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World." In this closing keynote discussion, Menn shares his perspectives on the evolution of cybersecurity, exploring the complex relationship between technology advancement and security.

How to Perform Hyper-V Storage Migration: A Step-by-Step Guide by NAKIVO

Hyper-V Storage Migration is Microsoft’s technology for moving the storage of virtual machines (VM) from one location to another without resulting in compatibility issues. Moreover, Hyper-V Storage Migration can be performed on live VMs, allowing you to avoid any downtime and continue business operations as usual. Watch this video walkthrough on how to use Hyper-V Manager and PowerShell to launch and configure Hyper-V Storage Migration.