Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

Vulnerabilities Within Law Enforcement Exposed

On September 15th, 2023, it was announced that a company in Stockport, UK, responsible for producing ID cards for various organizations, including Greater Manchester Police, fell victim to a ransomware attack. The attack, conducted using ransomware, had significant implications. Thousands of police officers’ personal details, including their names, were at risk of exposure to the public domain.

What is ISO 9001? Quality Management System (QMS) Standards

The International Organization for Standardization created ISO 9001 to provide an archetypal standard for quality management systems (QMS) worldwide. The most up-to-date version of the framework is ISO 9001:2015, which highlights the importance of risk-based thinking and decision-making to improve output and product quality. Utilized by organizations of all sizes and across most major industries, ISO 9001 helps streamline operations and align day-to-day processes with strategic objectives.

The Crucial Role of Identity in Zero Trust Security

In an increasingly digital world where cybersecurity threats are constantly evolving, organizations are embracing new strategies to protect their sensitive data and assets. One such approach that has gained prominence in recent years is Zero Trust. Zero Trust challenges the traditional perimeter-based security mindset and instead places a strong emphasis on identity as a cornerstone of a robust defense strategy.

How to Build an Effective ICS Security Program

Of all the different areas of cybersecurity, not many are as important, or have as far-reaching consequences as industrial control systems (ICS) security. While most relevant organizations would agree that ICS security is a significant concern for their operations, it is easier said than done. Many find it difficult to put into practice the measures and solutions necessary for sufficient ICS security.

How to Protect Your Facebook Account from Cybercriminals

The social media landscape has undergone dramatic change in recent years. Elon Musk bought Twitter and changed its name to "X." Mark Zuckerberg bought Instagram and WhatsApp before launching Threads to capitalize on Twitter's recent PR disasters. TikTok came out of nowhere to become the platform of choice for Gen Z. One thing, however, has stayed the same. Facebook remains, somewhat surprisingly, the most popular social media platform.

Leveling up Elastic Cloud security: Introduction to role-based access control

Did you know that you can assign roles to users to implement fine-grained control for your Elastic® Cloud organization and deployments? Role-based access control (RBAC) is a cloud security best practice that is considered a standard feature in enterprise software, as it provides a structured way to manage access to cloud resources. Within an RBAC framework, roles are a vital construct for grouping, organizing, and delegating permissions to different users.

Black Hat Asia customer panel recap: How to lead DevSecOps adoption

DevSecOps is all about collaboration: facilitating a solid partnership between development and security teams. However, these collaboration efforts won’t succeed without help from leadership. Development and security teams need top-down support to set measurable goals, create a secure CI/CD pipeline, and establish a DevSecOps culture. Three experts came together at Black Hat Asia 2023 to discuss how leadership can participate in fostering security success.

Keeper Security Introduces Major UI Update for Android

Keeper Security is excited to announce a significant update to our Android app that we think users will love. This update is heavily focused on bringing the same fresh, modern look to our Android user interface that our Web and Desktop received earlier this year and iOS just last month. The highly anticipated release incorporates improved usability and a distinctly light and modern theme.