Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is it Time to Rethink Your Security Stack?

The cybersecurity threat landscape is constantly evolving, requiring organizations to regularly evaluate their security stack to ensure it not only offers the highest level of protection, but is operated by a firm with a long track record of developing, implementing, and properly maintaining the highest quality security tools.

New Phishing Scam Leverages Chat To Add Credibility And Ensure Success

A new phishing scam is leveraging trusted aspects of ecommerce to make their scams look legitimate. Perception Point has spotted a new level of credibility used by phishing scammers in which fake payment pages include the use of legitimate support chat. Spoofed payment pages resembling marketplace, like Etsy and Upwork, ask business owners to “claim” payments for products or services sold.

FAQ: How Are STIGs, SRGs, SCAP, and CCIs Related?

In the world of government-adjacent security and compliance, there are many different terms and acronyms you’ll encounter for the processes you have to perform. Often, these terms are interrelated in a single process, so you tend to learn them in clusters. One such cluster includes STIGs, SRGs, SCAP, and CCIs. What are these, what do they mean, and what do you need to do to utilize them properly? Let’s answer the most commonly asked questions.

Avoiding Scams During the 2024 Paris Olympics

Breakdancing is coming to the world stage while French citizens stage a creative protest with the hashtag “JeChieDansLaSeineLe23Juin.” We’ll leave the dirty research on that to you. Regardless, the ramp-up to the 2024 Paris Olympics is proving to be an exciting and controversial affair. However, the Olympic call isn’t reserved for top athletes and sports enthusiasts. It’s also a prime opportunity for scam artists and fraudsters to exploit an influx of tourists.

Can My Credit Be Frozen Without My Knowledge?

It is possible for your credit to be frozen without your knowledge. A credit freeze stops creditors from accessing your credit report, which can prevent them from approving new loans in your name. Credit freezes do not expire, so to remove them, you must contact each of the three major credit bureaus: Experian, TransUnion and Equifax. Most people place credit freezes if they suspect their personal information or identity was stolen since credit freezes help protect from fraud.

Indusface - Product Release & Rollout SOP

Business continuity is at the forefront of most systems and process design at Indusface. In a recent blog, we discussed how Indusface follows design-for-failure principles a powerful approach that enables us to deploy faster. In this blog, I will talk about the processes we have to ensure that our code and rule deployments do not cause widespread downtime to our protected assets.

A Guide to Open Source Software

Open source software (OSS) is software for which the original authors have granted express copyright and usage permissions to allow all users to access, view, and modify the source code of these programs however they see fit and without the need to pay royalties. This is in contrast to proprietary, closed source software, which typically requires a paid license and cannot be added to, modified, or distributed by anyone except the owner of the rights to the software.