Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Navigating Australia's Cyber Landscape: IAM, PAM, and the Essential Eight Framework

In this webinar recording, explore how Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions empower organizations to achieve compliance with the Essential Eight framework, bolstering cybersecurity in the Australian landscape. What you’ll learn: How IAM and PAM support Essential Eight compliance. Real-world examples of strengthening cybersecurity. Insights into streamlining access management. Live Q&A highlights with industry experts.

VISTA InfoSec Achieves CREST Approval!

We are thrilled to announce this significant milestone in our journey toward delivering the highest standards in cybersecurity services. reflects our unwavering commitment to excellence, professionalism, and continuous improvement in the field of cybersecurity and penetration testing.. About CREST: CREST is a globally recognized accreditation body for cybersecurity professionals, emphasizing competence, ethics, and professional development. Being CREST certified means meeting rigorous industry standards.

Autonomous Endpoint Management

Tanium AEM leverages real-time insights from all Tanium cloud-managed endpoints to recommend and automate changes on endpoints within a customer’s environment, giving IT and security teams a safe, scalable, and automated platform to deliver increasingly efficient operations and an improved security posture at scale, with confidence, and in real time.

23 NYCRR Part 500 Amendment Compliance Checklist

Banks and Insurance companies in New York are grappling with the complexities of 23 NYCRR Part 500, a challenging cybersecurity regulation that demands comprehensive and nuanced security measures. The primary hurdle for these organizations is translating the regulatory language into actionable, practical steps that meaningfully enhance their cybersecurity posture.

Did you make the *security* naughty or nice list this year?

As we approach the end of the year, many of us are reflecting on what we accomplished in 2024 — what did we do well this year? What could we have done better? It's also the perfect time to reflect on how to improve your team’s security practices. Have you been staying ahead of threats or have you let a few vulnerabilities slip through the cracks?

4 tips for securing GenAI-assisted development

Gartner predicts that generative AI (GenAI) will become a critical workforce partner for 90% of companies by next year. In application development specifically, we see developers turning to code assistants like Github Copilot and Google Gemini Code Assist to help them build software at an unprecedented speed. But while GenAI can power new levels of productivity and speed, it also introduces new threats and challenges for application security teams.

Understanding NIS2: Essential and Important Entities

NIS 2 aims to enhance the security of networks and information systems in the EU. Its main goal is to level up the cybersecurity game across Europe. It requires organisations in critical sectors to take cybersecurity seriously. The transposition of the NIS2 Directive into national law by member states emphasizes the deadline for compliance and the implications for cybersecurity regulations within each country’s legal framework.

NIS2 Penetration Testing and Compliance

Every day, we hear about security threats and attacks on organisations. These threats can range from ransomware and data breaches to leakage of sensitive data. There is no denying that cyber threats have been on the rise, and many organisations have fallen victim to these attacks, leading to financial and reputational losses. Hence, it is crucial to implement policies and processes that can help respond to these attacks.

How to Prevent Hacking During the Holiday Season

The holidays are a busy time for cyber attackers. They rely on distracted workers and lax security systems to breach an organization’s defenses. Then, they deploy ransomware or perform smash-and-grab operations on as much information as they can get their hands on. Either way, the goal is the same: profiting from a brief moment of weakness in your cybersecurity defenses. If you’re wondering how to prevent hacking during this hectic time of year, Lookout is here to help.