Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Beyond Snapshots: The Need For Continuous Penetration Testing

By James Rees, MD, Razorthorn Security Times must change (and always will) and nowhere is this more true than in the realm of technological advancement. Thirty years ago, the technological landscape was vastly different from what we have today and technological change has outpaced Moore’s Law for some time now. Information security must keep pace with these advancements. This has become especially true with the advent of AI.

How CISO as a Service can Improve Your Security Posture and Reduce Costs

Cybersecurity is a critical and complex challenge for every business in today’s digital world. However, not every business has the resources, expertise, or time to manage its security effectively and efficiently. That’s where CISO as a Service comes in. CISO as a Service is a flexible and scalable solution that provides you with access to a dedicated and experienced Chief Information Security Officer (CISO) and their team of security professionals.

US CERT Alert AA24-242A (RansomHub Ransomware)

On August 29, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3) issued an urgent advisory warning security teams about known RansomHub ransomware IOCs and TTPs identified through FBI threat response activities and third-party reporting as recently as August 2024. Detailed information about this threat and the associated IOCs and TTPs can be seen in the advisory #StopRansomware: RansomHub Ransomware.

IoT Automation: Top Applications and Key Benefits

Curious about how IoT automation can revolutionize your industry? This article dives into practical applications like smart manufacturing, predictive maintenance, and remote monitoring. We’ll explore the key benefits, including increased productivity, cost cuts, and improved safety, including real-world examples and insights on how IoT is driving efficiency and innovation in industrial automation.

Best Practices for Creating Strong Passwords You'll Remember

Making sure your password is strong yet memorable can be challenging and stressful. However, following best practices – like using passphrases, incorporating acronyms and relying on a password manager – will ensure your passwords are strong and safe. A strong password should contain at least 16 characters, with a combination of uppercase and lowercase letters, numbers and symbols.

How Frequently Should We Run a Vulnerability Scan?

All it takes is a single unpatched vulnerability to breach security and gain access to a company’s mission-critical assets. Effective vulnerability management is essential for strong cybersecurity. Vulnerability scans play a key role in this process, offering a clear view of the entire IT infrastructure and identifying existing vulnerabilities. How many times should we run scans? Are we scanning often enough? These are the questions we often get.