Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 2021

What is SASE (Secure Access Service Edge)?

SASE (Secure Access Service Edge) is a network architecture that unifies network and security solutions into a cloud-based service to enhance accessibility, efficiency, and cybersecurity. The concept of SASE was introduced in Gartner's 2019 report 'The Future of Network Security Is in the Cloud'. The concept emerged from organizations' increasing demand for reliable access across transforming network approaches.

ISO 27001 Implementation Checklist

ISO/IEC 27001, commonly referred to as ISO 27001, is the most widely adopted international standard for managing data security and information security through an information security management system (ISMS). The standard was first published in 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). ISO 27001:2013 is the latest revision to the standard.

A Clear Explanation of Australia's Ransomware Action Plan

During a ransomware attack, a victims vital internal processes are seized and encrypted, completely forcing their business offline. These crippling actions are only reversed if a ransom payment is made. Ransomware attacks are an escalating threat to global security and the Australian Government is taking a firm stance against it. With global ransomware damage costs predicted to reach $20 billion and increasing cyberattack complexity, this isn't a fight a single country can win alone.

6 Most Common Causes of Data Leaks in 2021

The trend of global data breach events is steep and still continuing to tilt upwards. According to the latest data breach investigation report by IBM and the Ponemon Institute, data breach costs in 2021 have reached a record high. Last year, the average cost was US$3.83 million, and this year it has peaked at US$4.24 million. Mitigating these events involves comprehensive management of the entire attack surface, including the third, and even fourth-party vendor network.

What is an Intrusion Detection System (IDS)? + Best IDS Tools

An intrusion detection system (IDS) is a software application or hardware device that detects vulnerability exploits, malicious activity, or policy violations. IDSs place sensors on network devices like firewalls, servers, and routers, or at a host level. Once the IDS detects any cyber threats, the system will either report this information to an administrator or a security information and event management (SIEM) system collects it centrally.

What is a Cache?

A cache is a temporary data storage location that stores copies of frequently accessed data or files to provide faster access to software or hardware. Computers, mobile devices, web browsers, and other applications use cache to speed up data retrieval. Caches allow faster access to this data by removing the need to reload it each time the device/app needs it. Cached data is reusable and can be retrieved directly.

What is Open Source Intelligence?

Open source intelligence (OSINT) is the process of identifying, harvesting, processing, analyzing, and reporting data obtained from publicly available sources for intelligence purposes. Open source intelligence analysts use specialized methods to explore the diverse landscape of open source intelligence and pinpoint any data that meets their objectives. OSINT analysts regularly discover information that is not broadly known to be accessible to the public.

What is a Proxy Server? How it Works and Critical Risks in 2021

A proxy server is an intermediary server that retrieves data from an Internet source, such as a webpage, on behalf of a user. Proxy servers have many different uses, depending on their configuration and type. Common uses include facilitating anonymous Internet browsing, bypassing geo-blocking, and regulating web requests. Like any device connected over the Internet, proxies have associated cybersecurity risks that users should consider before use.