Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

A Comprehensive Guide to Azure Data Security

In our interconnected world, the value of data is growing with cyber threats also on the rise. This causes the security and protection of data to become crucial. Organizations have become compelled to adopt strict measures to safeguard their data. Implementing security practices in data protection and encryption ensures the confidentiality, integrity, and availability of the data stored in the cloud.

Eco-hacks: The intersection of sustainability and cyber threats

Environmental sustainability is more important than ever before for organizations across all sectors. Sustainability concerns including geopolitics, future-focused developments, advanced ESG reporting, and building sustainability into supply chains going forward are all significant trends shaping businesses in 2023 and beyond.

Can You Guess Common Phishing Themes in Southeast Asia?

Researchers at Cyfirma outline trends in phishing campaigns around the world, finding that Singapore is disproportionately targeted by phishing attacks. Singapore’s position at 5th place “Between 1st January and 1st August, CYFIRMA’s telemetry recorded 410,793 phishing campaigns,” the researchers write.

How to Build an Insider Threat Program [10-step Checklist]

An effective insider threat program is a core part of any modern cybersecurity strategy. Having controls in place to detect, deter, and respond to insider attacks is necessary for your organization to protect its sensitive data. It’s also required by many IT regulations, standards, and laws: NISPOM, NIST SP 800-53, HIPAA, PCI DSS, and others. In this article, we’ll shed light on the main insider threat program requirements and share the best tips on how to build an insider risk program.

Popular Gaming Trading Platform Traderie Breached Losing User Data

Traderie is a special trading platform dedicated to enabling Animal Crossing: New Horizons, Roblox, Elden Ring, Diablo, and Rocket League players to buy and sell in-game items with one another. The third-party trading service manages data for millions of game users and was recently the victim of a data breach that compromised a huge number of customers. If you rely on Traderie to make gaming trades, you may have had your data exposed.

Why Legacy AV Is an Easy Target for Attackers

If you still rely on legacy antivirus software to stop modern cyberattacks, this post is for you. Today’s adversaries are relentless. While many threat actors have adopted newer techniques such as data extortion, identity-based threats and in-memory attacks to achieve their goals, some continue to rely on tried-and-proven threats — and legacy software is no match for either.

Brivo Named as One of the MES Midmarket 100 Companies for 2023

We are excited to announce that Brivo, the global leader in cloud-based access control, has been recognized as one of the named companies for the MES Midmarket 100 list for 2023. This award highlights Brivo’s commitment to delivering industry-leading solutions and services to mid-market organizations that need growth and innovation.

Announcing JFrog SAST: Build Trust and Release Code With Confidence

Today’s software applications power almost every aspect of our lives, and ensuring the security of these applications is paramount. Threat actors can cause devastating consequences for companies, leading to financial losses, reputational damage, and legal repercussions. Companies building commercial or in-house applications must adopt robust security measures throughout their software development lifecycle to avoid releasing vulnerable code.

5 Types of Software Supply Chain Attacks Developers Should Know

What do ambulances in the UK, the Norwegian government, and a major Russian bank have in common? They were all victims of successful supply chain attacks in July 2023. Could you be next? It’s more likely than you think. Organizations entrust more sensitive data to vendors and third parties (like government agencies and critical infrastructure operators) than ever as part of their software development and operations.