Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Critical RCE Vulnerability in Multiple Cisco IP Phones: CVE-2023-20078

On Wednesday, March 1, 2023, Cisco published an advisory of a critical severity vulnerability impacting 6800, 7800, and 8800 series IP phones. The vulnerability allows for unauthenticated execution of arbitrary code. The vulnerability was responsibly disclosed to Cisco by a security researcher, and security patches are available to remediate the vulnerability.

How to Protect Your Online Privacy

You can protect your online privacy by being aware of and cleaning your digital footprint; using strong, unique passwords for each of your accounts; not oversharing on social media; reading privacy policies carefully and more. Continue reading to learn more about online privacy and the steps you can take to protect yours.

What Does it Cost to Get ISO 27001 Certified? A Full Breakdown

Businesses looking for serious compliance street cred often turn first to ISO 27001. ISO 27001 is a globally recognized framework that outlines and defines information security management system (ISMS) requirements. Because being ISO 27001 certified demonstrates an organization meets best practices for information security, ISO certification can give businesses a significant competitive advantage. If you’re weighing ISO 27001 vs.

BeyondCorp, Federal Zero Trust Architecture Strategy and Teleport

"Crunchy on the outside, chewy in the middle". That's how Google described its perimeter-based security targeted high-profile companies such as Google, Adobe, Akamai, Rackspace, etc., with said primary reason of modifying the source codes. In response, Google initiated a perimeter-less and trustless access control system now popularly known as BeyondCorp. BeyondCorp comes from a realization that VPN perimeter network security is obsolete.

8 Common Cybersecurity issues when purchasing real estate online: and how to handle them

More and more, people are completing the entire real estate transaction process online. From searching for properties to signing documents, online convenience can make the process easier and more efficient. However, with all of this activity taking place on the internet, it is important to be aware of the potential security risks that come along with it.

XDR: what is it, how does it work and how do MSPs use it?

We have been talking about eXtended Detection and Response (XDR) for some years now, but despite being a buzzword in the industry, a fundamental question remains: what are we really talking about here? According to Gartner, which first defined the term in 2020, XDR is a vendor-specific threat detection and incident response tool that natively integrates multiple security products into a cohesive security operations system.

February Cyber Roundup

The Dutch Police have arrested three individuals for suspected ransomware activity, which generated at least 2.5M Euro in extortion fees. The actors are believed to have attacked thousands of organizations, compromising the data of tens of millions of individuals. This is another example of successful law enforcement activity against ransomware operations. Such activity has increased over the past year, leading to the arrest of several prominent ransomware group members, such as Revil and Netwalker.

10 Database Security Best Practices You Should Know

Around 39 billion records were compromised between January and December of last year, according to Flashpoint’s 2022 A Year in Review report. While this result is quite staggering, it also sends a clear message of the need for effective database security measures. Database security measures are a bit different from network security practices. The former involves physical steps, software solutions and even educating your employees.

How Tines achieved SOC 2 compliance in record time, saving 250+ human hours

Achieving any kind of compliance can be grueling. Ensuring your organization is SOC 2 compliant is often a particularly laborious endeavor, requiring extensive resources to obtain and maintain. SOC 2 is a comprehensive cybersecurity compliance framework developed by the AICPA (American Institute of Certified Public Accountants). It helps guarantee third-party service providers handle customer data with appropriate security measures.

How to Identify And Prevent ARP Poisoning or Spoofing Attacks

Address Resolution Protocol (ARP) acts as a vital bridge between the world of IP addresses and MAC addresses, allowing devices on local area networks to seek out each other's physical address based solely on their IP. ARP (Address Resolution Protocol) can also be defined as a communication protocol used to map a network layer address (such as an IP address) to a link layer address (such as a MAC address).