Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Prioritizing Cybersecurity: Syteca Renews Cyber Essentials Certification

We’re announcing that Syteca has successfully renewed its Cyber Essentials certification — a crucial step in ensuring our continued commitment to strong cybersecurity practices. We have once again confirmed that our company is 92% more resilient than organizations operating in the UK without the certification. As cyberattacks evolve, taking proactive security measures is crucial.

World Backup Day: an IT practitioner's perspective on data loss prevention

In today's world, data is king, but it's also a source of risk. Companies face a constant barrage of threats that can lead to devastating data loss. These include everything from simple hardware and software failures to natural disasters and major cyber attacks. The consequences of data loss can be severe, impacting revenue, operations, reputation, and legal compliance, so planning for these worst-case scenarios is an important part of an IT team’s playbook.

Why Vulnerability Management Is AI's Biggest Untapped Opportunity

The security industry has reached a turning point with AI. It’s no longer just hype, as AI has now become a critical part of day-to-day cybersecurity operations. According to The Rise of AI-Powered Vulnerability Management, the latest report from Seemplicity and Dark Reading, 86% of security teams now use some form of AI in their security stack. More than half of respondents say AI is already crucial to their work.

How to Use Microsoft Copilot for Security: Complete eGuide to Generative AI for Cybersecurity

In the constantly evolving world of cybersecurity, defense teams need all the resources they can get to keep up. Fortunately, the massive advances in generative AI present SOC teams with a powerful set of tools to optimize security practices and match even fully automated adversaries using natural language input. Microsoft Security Copilot is among the most advanced examples of these tools.

Enhancing Application Security with Container Runtime Security

Containerization, a form of lightweight virtualization, lets applications inhabit their own self-contained environments. Each container packages everything an application needs to run – code, runtime, libraries – keeping it neatly separated from everything else. This isolation is a big deal because it means a problem in one container won’t bring down the whole environment.

Ep 4: Naming and Shaming

As Chinese hackers continue their raid of American companies, the threat reaches new levels of urgency, not so much for the sophistication of these hackers, but because of the sheer volume of attacks. And yet, victims continue to keep their breaches under wraps, and the government is hamstrung in what they can say because most everything they know about Chinese cyberespionage is classified.

Github Actions Supply Chain Attacks

This week, we discuss a recent cascading supply chain attack involving multiple Github actions workflows that nearly succeeded in compromising a popular Coinbase application. Before that, we discuss a novel way to download malware onto an endpoint by abusing a web browser's caching feature. Additionally, we cover an FBI alert on file converter malware scams.