Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

World Backup Day and the Importance of Being Prepared

It’s been nearly 365 days since the last World Backup Day, and we’ve got a lot to discuss. Let’s see, I completed my annual rewatch of The Sopranos. I took a deep dive into the SEC’s new cybersecurity rules and the nature of “materiality.” My wife and I finally agreed on a new sectional for the living room. What else … OH YEAH AND WE HAD A KID. Like I said, it’s been quite the year.

Lessons learned from the Google trade secret theft indictment

On Wednesday, March 6th, 2024 the US Attorney’s Office of Northern California announced that a federal grand jury had indicted Linwei Ding on four counts of trade secrets theft. Ding was arrested in Newark, California and now faces up to 10 years in prison and a fine of $250,000. We did a deep dive into the indictment to understand what happened and help security leaders and practitioners apply lessons to their own information security practice. Read on to learn more!
Featured Post

SMEs Invest in Tech Opportunities but Risk Missing Security Safeguards

Across Europe, 100 million people are employed by small and medium-sized enterprises (SMEs). The UK has over five million SMEs, providing three-fifths of employment and £2.4 trillion in turnover. As a vital component in the national economy, SMEs must continue to invest in automation, technology-led innovation, and underpin this with strong security.

Employee Clock-In Systems: Balancing Efficiency and Employee Satisfaction

How can businesses ensure that their employee clock in system maximize productivity without compromising employee satisfaction? This delicate balance often poses a significant challenge for many organizations. By ensuring the right blend of efficiency and satisfaction, companies can not only boost their operational success but also foster a positive work environment. As we proceed, we'll explore various strategies to achieve this balance, leaving you equipped to make well-informed decisions regarding your own company's clock-in system.

Code Review Practices: Cultivating a Culture of Clean Code within Development Teams

Every day, development teams rely on reviews to ensure high-quality code, encourage knowledge sharing, and strengthen professional relationships. By including the whole team in driving the growth of the base and enforcing its standards, they provide developers with the certainty that their contributions achieve the highest standards. On top of that, they head off technical debt and bring attention to chances for praise and positive reinforcement.

Top tips: Three hacks to safeguard your privacy online

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re looking at three hacks to secure your online privacy. In today’s world, we exist online as much as offline. There’s few mysteries left in our lives. Most information you need about a person is a few clicks away.

Tech tales and endpoint hacks: Dive deep with Endpoint Pulse

Remember the captivating stories you heard growing up? Though we may have graduated to books and then podcasts, the power of storytelling remains. There’s something timeless about the art of storytelling. That’s the spirit behind Endpoint Pulse, your one-stop podcast for all things endpoint management and security. We embarked on this journey in October 2023, and after months of hard work, we released our first episode in January 2024.

Commercial spyware: The stealthy threat

It can be difficult to over-estimate the benefits that we accrue from the use of technology in our day to day lives. But these benefits have come at a price which has redefined what we expect in terms of privacy. As a member of Generation X, which came of age at the dawn of the Internet era and witnessed the rise of an entire industry built on consumer information analytics, I have on occasion struck my own Faustian bargains, offering up my personal data in exchange for convenience. As have we all.

Securing the Internet of Things: Penetration testing's role in IoT device security

The world is witnessing a remarkable transformation as more devices become interconnected, forming what’s known as the Internet of Things (IoT). From smart refrigerators and thermostats to wearable fitness trackers and home security systems, IoT devices have seamlessly integrated into our daily lives. These innovative gadgets promise convenience, automation and improved efficiency.