Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Smartphones: The Usual Suspects in Car Accident Cases

Smartphones have become such an integral part of our way of life that we cannot seem to do anything without them. We're always chatting, answering calls, going through social media, etc., and the most dangerous part is that we even do these things while driving. Such an action can be categorized as distracted driving, which is engaging in other activities as a driver that distract you from paying attention to the road.

2024 RSA Recap: Centering on Cyber Resilience

Cyber resilience is becoming increasingly complex to achieve with the changing nature of computing. Appropriate for this year’s conference theme, organizations are exploring “the art of the possible”, ushering in an era of dynamic computing as they explore new technologies. Simultaneously, as innovation expands and computing becomes more dynamic, more threats become possible – thus, the approach to securing business environments must also evolve.

AWS WAF vs. AppTrana WAF

AWS WAF, a widely used security tool from Amazon Web Services, is a web application firewall designed to safeguard web application servers against various online threats. The tight integration of AWS WAF with key AWS services, including Amazon CloudFront CDN, Application Load Balancer (ALB), and Amazon API Gateway, ensures a comprehensive security approach. AWS WAF can also protect services offered by other providers as long as the content is delivered via the CloudFront distribution network.

What is a Third-Party Risk Assessment in Cybersecurity?

A third-party risk assessment pulls risk vendor risk data to help cybersecurity teams understand how to best mitigate supplier risks. Though the field of Third-Party Risk Management (TPRM) is evolving to prioritize compliance, security, and supply chain risk, third-party risk assessments could also be used to uncover an organization’s exposure to financial, operational, and reputational risks stemming from its third-party network. Learn how UpGuard streamlines Third-Party Risk Management >

Applying Zero Trust to Security Service Edge (SSE)

The current situation with legacy on-premises security defenses trying to support a hybrid work environment and zero trust principles is challenging for companies. Complications can include poor user experience, complexity of disjointed solutions, high cost of operations, and increased security risks with potential data exposure. Simple allow and deny controls lack an understanding of transactional risk to adapt policy controls and provide real-time coaching to users.

Caught in the act: Ransomware attack sticks to our AI-created honeypot

Here is the story of how we caught a ransomware attack in our research honeypot. Ransomware attacks on enterprise organizations lead the news. See Change Healthcare and Ascension. Attackers spend their time on the victim’s network, exfiltrate gigabytes of sensitive data, then lock victim’s systems — and ask for millions of dollars in ransom payment. We also hear news about how AI is used maliciously.

How Do Cybercriminals Gather Personal Information About Their Targets?

Cybercriminals gather personal information about their targets by using social engineering techniques, looking at social media accounts and collecting data that gets leaked from public data breaches. The more personal information a cybercriminal can collect about their target, the easier it is for them to launch cyber attacks that their targets will easily fall for. Continue reading to learn more about how cybercriminals gather their target’s personal information and how you can keep your data safe.

Why Dark web monitoring is essential for Digitally connected system

Explore the importance of implementing dark web monitoring for a digitally connected system. Understanding the Dark Web The Dark Web refers to the part of the internet that is not indexed by search engines and requires specific software or authorization to access. It is a hidden network where illegal activities often take place, including the buying and selling of stolen data, drugs, weapons, and other illicit goods.