Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing Your Cloud Infrastructure with Azure & Tines

In the third instalment of "Tines, securing your cloud infrastructure" we look at two stories designed to save money and resources and close potential security gaps in your Azure environment. Firstly, we'll address the task of 'Updating groups assigned to a user in Azure Active Directory' which allows admins to update a user's group membership in Azure Active Directory. This is essential for adding extra security to accounts flagged for suspicious activity and protecting the team & company as a whole.

Applying Vulnerability Intelligence to CVSS and SSVC Frameworks

In this presentation, we explore the intersection of vulnerability intelligence and prioritization frameworks such as CVSS and SSVC as a means for strategically and rapidly prioritizing vulnerabilities to stay ahead of exploitation risks. We delve into the process of applying real-time threat intelligence tailored to the vulnerability landscape to enhance decision-making, optimize resource allocation, and ensure a precise and proactive defense against cyber threats.

4 Key Ways IT Leaders Can Build a Strong Tech Team

IT leaders play a significant role in the success of a tech company. IT leaders are key persons for driving digital transformation, aligning IT with business strategy, fostering innovation, managing IT talent and imperative change agents within an organisation. Life has taken a different course post-COVID-19 pandemic and has resulted in a myriad of changes in almost every aspect of life, even in the lives of IT leaders.

Top 8 Cybersecurity Trends for 2024

In 2023, cyberthreats increased and diversified, resulting in increased security challenges for organizations around the globe. Meanwhile, AI greatly increased its presence in the realm of cybersecurity. It’s time to look ahead and focus on the anticipated cybersecurity threats and trends in 2024. What can we expect from threat actors and security specialists in the upcoming year? Read on and find out!

What is XML External Entity, How to Find XXE Vulnerabilities and Patch Them

An XXE vulnerability is a security vulnerability that allows attackers to access sensitive data or execute malicious code in a web application. This happens when the application accepts XML input from an untrusted source and doesn’t properly validate it. An attacker can exploit this vulnerability by crafting a special XML input that includes a reference to an external resource (like a file or URL) that they control.

Striking the Right Balance: Compliance vs. Real Cyber Risks | Navigating Organizational Priorities

In our latest exploration of cybersecurity challenges, we delve into the delicate balance organizations must strike between compliance efforts and the real cyber risks they face from the outside world. It's a common pitfall for organizations to develop a higher tolerance for compliance risks, often channeling significant resources and funds into demonstrating adherence rather than actively managing and mitigating specific threats.

5 Strategies for Protecting the Public and Private Sectors from Cybersecurity Threats

The proliferation of technology in the present age, while undeniably a win for innovation and modern convenience, has unfortunately been paralleled by an upsurge in cyber threats that present a multifaceted challenge to both businesses and individuals. As people become more reliant on digital platforms for everything from commerce to communication, the potential for cyberattacks will only escalate.

APIs and automation: The good, the bad, and the better

APIs are often adopted by businesses as a way to automate certain operational tasks. This not only helps to introduce efficiencies, it also reduces the chance of human error in repetitive, manual actions. But the relationship between APIs and automation doesn’t end there. To streamline the API management process, developers have started automating a variety of tasks in the API lifecycle, from development to production.