Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

NIST Cybersecurity Framework - All You Need To Know

The advent of technology and its latest innovations has come with its own challenges in the form of cyber attacks, and data theft, and protecting themselves from them is a task for most organizations and if not done properly, can leave the organizations vulnerable. This Blog Includes show What is NIST cybersecurity framework? All About NIST Why Is NIST Important? Make your Website / Web Application the safest place on the Internet.

MFA phishing: the cyberattack that is compromising big company networks

Cybercriminals are well versed in the tactic of phishing, which aim to trick users into revealing confidential information and gain unauthorized access to user accounts and compromise corporate networks. A new type of phishing attack has now emerged, known as MFA phishing, which manages to evade the key protection measures deployed by corporate networks.

Social Media Privacy: Which Social Platforms Are the Most Secure

Social media has become an integral part of our lives, enabling us to connect with friends, share experiences, and express ourselves. However, with the increasing reliance on social media platforms, concerns about online privacy and data security have also emerged. So which social platforms are private and which ones are not? Are there any more private alternatives to the traditional platforms we all know and use?

Insider Threats Packing Their Bags With Corporate Data

The insider story, whether it is a disgruntled or negligent employee, is one that is familiar to many organizations. The 2020 Securonix Insider Threat Report found that 60% of the insider threat cases they dealt with involved a “flight risk” employee, or an individual that is getting ready to leave their employment.

Properly Explaining Risk Appetite to the C-Suite

In the first part of this series, we looked at some common issues when a Chief Information Security Officer (CISO) is communicating with the Board. At the heart of many of these issues is how the CISO and upper management view security. As one CISO recently told me, "It's a catch-22 situation: If the business leaders don't consider this to be a business problem, they are unlikely to listen to people they don't consider to be business leaders telling them it is.".

Preparing Employees to Combat Phishing - Closing the Learning Loop

Phishing emails are a tremendous threat and one of the most common vehicles cyber criminals use to trick employees and succeed in their attacks. Cybercriminals are on a mission to gain access to sensitive information, such as login credentials, business information, customer data, or financial data. Despite the best efforts by IT departments and security professionals to put the proper filters in place, cybercriminals still often find a way to get into employee inboxes with their phishing schemes.

The Importance and Benefits of Incident Response

An Incident Response Plan prepares a business for responding to a security breach or cyber-attack. An Incident Response Plan outlines the steps an organisation should take when they discover a potential cyber-attack, allowing them to quickly identify, contain, and remediate threats. It’s also essential for organisations to have processes in place when reporting a cyber attack.

McPherson Hospital Suffers a Data Breach Exposing Data For Up to 19k Patients

McPherson Hospital is a large-scale health facility in McPherson, Kansas. The hospital employs more than 225 people and offers walk-in care, emergency care, primary care services, and a range of specialty health services. This large facility generates approximately $7 million in revenue annually. It was hit by a data breach recently, risking the information of patients significantly.

Kubescape & Jit

Kubescape is an open-source, CNCF sandbox, end-to-end Kubernetes security tool designed to assess the security posture of Kubernetes clusters created by ARMO. It helps identify security risks and misconfigurations that could potentially be exploited by attackers, and provides automatic assistance to remediate them. Kubescape was launched less than two years ago, in August 2021, and already has more than 8.3K stars on GitHub, and over 100 open-source contributors.

Red Teaming: 4 Ways to Get the Best Value While Improving Your Security

Red Teaming will always have similar concepts and strategies, but no Red Team endeavour is the same, and the meaning may change from one organization to another. Simply stated, Red Teaming is acting as an adversary within your own network to achieve a scenario or objective that a potential attacker can leverage or has value. A true Red Team objective should not be to achieve the goals as quickly as possible. A Red Team operation requires a dedicated team, the right tools, and patience.