Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Breaking News

A Swiss Army Knife for ISO 27001:2022 Compliance

ISO standards may not always jump out as the most exciting of topics for dinner party conversation, but their growing importance in business cannot be denied. And this year it is well worth us talking about ISO 27001:2022 specifically (though perhaps not over dinner). It is expected that as many as 90,000* organisations might renew their certification or gain it for the very first time this year. The auditors will be busy!

Vendor Risk Management: Benefits, Process, Software, and Tools

Vendor risk management (VRM) is a process that helps businesses manage the risks associated with their vendors. This includes assessing how well their vendors are performing, identifying potential problems early, and taking appropriate action to mitigate any damage.

Weekly Cyber Security News 28/03/2024

Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! Social engineering attacks can be very effective and good that someone spotted one but unfortunately for them persistence scored in the end.

Election Security: Defending Democracy in Today's Dynamic Cyber Threat Landscape

With over 50 countries heading to the polls this year, including major economies like the U.S., India and the U.K., 2024, one way or another, will be a defining year with over 4 billion voters – around half the world’s population – participating in the democratic process.

The top 10 cybersecurity threats in 2024

In 2023, cyber threats increased and diversified, resulting in increased security challenges for organizations around the globe. Meanwhile, AI greatly increased its presence in the realm of cybersecurity, both negatively and positively. 2024 is going to be a year in which advanced AI tools and complex social engineering tactics will further alter the cybersecurity game. In this article, we will focus on the most important cybersecurity threats in 2024.

Smart thresholds: The answer to your security alert fatigue

SIEM solutions operate based on thresholds. These thresholds serve as predefined benchmarks that generate alerts when the alert criteria is met. While effective to some extent, this approach falls short on multiple fronts, particularly in the context of sophisticated attacks and dynamic environments. Static thresholds falling short One of the fundamental flaws of static thresholds lies in their rigidity.