Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How Does Passwordless Authentication Work?

Passwords are the digital keys to our lives. They unlock everything from our most sensitive financial data to our personal communications and cherished memories. For online businesses, they are a safety net that allows customers to transact business and make purchases with apparent security. Yet, for all their importance, passwords remain a glaring weak point in online security. Consider this: 81% of data breaches hinge on compromised passwords.

Are Google-Generated Passwords Safe?

Google’s auto-generated passwords aren’t typically the most secure as the character limit is 15. Having a limit of 15 characters prevents a user from creating longer passwords. The longer a password is, the harder it is for cybercriminals to crack. Continue reading to learn more about Google-generated passwords and why they are not the most secure option for your digital security.

What is Cloudforce One. How we thwarted FlyingYeti's campaign targeting Ukraine

In this week’s episode, we have a segment about how we thwarted a threat campaign targeting Ukraine and explain what our team, Cloudforce One, does. Host João Tomé is joined by Blake Darché, Head of Cloudforce One. First, we discuss how Cloudforce One employed proactive defense measures to successfully prevent Russia-aligned threat actor FlyingYeti from launching their latest phishing campaign targeting Ukraine.

OWASP API Top 10 Explained with Real-World Examples

It’s an API talking to the API world we’re living in. As per Postman, 500 million new APIs are expected to be created by 2025. APIs are a lifesaver when it comes to automation or integration. But when it comes to the security of these APIs, things can get a little tricky. OWASP API Top 10 gives insights on top vulnerabilities exploited in APIs.

How to Migrate CentOS 7 to AlmaLinux

Jump to Tutorial As of June 30, 2024, CentOS 7 will reach its end of life (EOL). That means it will no longer receive updates, bug fixes, critical security patches, or any new features. It is very important to migrate to a supported operating system to maintain the functionality and security of your systems. AlmaLinux is a reliable alternative to CentoOS. It’s a community-driven enterprise distribution that is binary compatible with Red Hat Enterprise Linux (RHEL).

USB Drive Security Best Practices

In our increasingly digital world, USB drives remain a convenient way to transport and store data. However, the use of these devices in corporate networks introduces several security concerns. This blog post will cover USB security best practices to equip you with the knowledge to safeguard your company’s valuable information against the security risks of removable media devices such as flash drives.

How Enterprise Identity Protection Can Prevent Cyber Attacks?

Protecting enterprise identities has never been more critical in today's interconnected business landscape. Cybersecurity Ventures predicts cybercrime will cost the world $10.5 trillion annually by 2025. Attacks on company identities are a major cause of cybercrime. Hackers are always trying to steal employee logins to get into company secrets. They use tricks like phishing emails and fancy hacking to do this. Protecting identities is super important for businesses, and it is not just an IT concern.

5 Security Logging and Monitoring Mistakes to Avoid

As cybersecurity attack vectors evolve, security logging and monitoring are becoming even more important. Effective logging and monitoring enables organizations to detect and investigate security incidents quickly. Cloud-based attackers are getting more sophisticated, and often rely on stolen credentials to escalate privileges and move laterally within corporate IT networks.

Top tips: Camfecting-Protect yourself from prying eyes

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’ll give you five tips to prevent hackers from accessing your webcam without your knowledge. Ever stopped to wonder if someone can see you through your webcam even when you’re not actively using it? Wonder no more!

Essential Phishing Training Tips to Level Up Your Security

Phishing scams have become more common over recent years. According to experts, cyber-attacks have doubled since the onset of the COVID-19 pandemic. Phishing scams are regularly used to steal personal data and money from unsuspecting victims. According to the University of Florida, the average phishing scam costs its victims $173, although the losses can of course be much higher.