Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

RDS: Do Not Allow LPT Port Redirection

This policy specifies whether to prevent the redirection of data to client LPT ports during a Remote Desktop Services session. You can use this setting to prevent users from mapping local LPT ports and redirecting data from the remote computer to local LPT port peripherals. If a value is configured to Disabled or Not Configured, the attacker can leverage it to map the client’s LPT ports. In addition, he can use the port to redirect data from the Terminal Server to the local LTP ports.

Code Sight IDE Plugin Combines SAST and SCA to Analyze Proprietary and Open Source Code | Synopsys

Until now, single analysis tools have given developers only a partial view of security risks – providing either static analysis of proprietary code or software composition analysis of open source. This separation often leads to undetected vulnerabilities, decreased developer productivity, and longer release cycles.

Testimonial Video about Ignyte

Due to the increase in #frequency and volume of new security #threats. Organizations need to conduct a robust assessment to determine their risk and also evaluate their #preparedness. Ignyte's Integrated risk management platform is designed to meet rising expectations of the #compliance function and lay foundations for future success. Ignyte helps teams to look ahead and anticipate and mitigate #uncertainties to enhance business performance.

Why is a disaster recovery plan important?

JUMPSEC Jargon Buster - Nikoo explains why a disaster recovery plan is important? Business Continuity Plans and Disaster Recovery plans are two key elements of the ISO27000 series of standards. Disaster recovery plans allow organisations to plan in advance what to do in the event of a serious interruption to business-as-usual, by having robust plans made in advance, it reduces the potential business impact of an interruption and helps restore operations quickly. the process and details of this plan are essentials for stopping disasters from occurring in the first place.

Undetected E01, Johan Edholm - Evolution of hacking; Web Security to companies of all sizes.

Do you remember when you first connected to the Internet? Security nerds Laura and Johan go back to the Internet in the 90's, the evolution of hacking and the transformation of IT security into an industry where hackers are now allies to companies.