Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tracking the transport of radioactive sources with blockchain

This week, Australian authorities recovered a tiny capsule, just 6mm x 8mm (0.24 x 0.31 inches) along a 900km section of Australia’s longest highway, the Great Northern Highway. The pea-sized capsule was a radiation gauge containing caesium-137, a radioactive material with a half-life of 30.05 years, that is used to measure the density and flow of materials in the mining, and oil and gas industries.

Why Bots Threaten Your Cybersecurity

Say what you want about bots, but you have to admire their versatility. Bots do everything from rank Google results and serve up cat photos on your Facebook feed, to sway elections and defraud retailers. Basically, they’re quite flexible. These days, bad bots are big business, with cybercriminals around the world using them to fraudulently access accounts, attack networks, and steal data.

Secrets Need to be Secured Everywhere Not Just in Code Repositories

Organizations are unaware of the prevalence of API keys and secrets throughout their systems, and how their users are sharing and using them. Even with security best practices and policies in place, the lack of awareness or compliance, as well as the possibility of human error means that API keys and secrets need protection regardless of where they are stored or shared.

Difference to Know: Cyber Security, Software Security, Application Security

Did you know that when we talk about online security, cyber security, application security, and software security are all different? Sometimes, software security and application security are used interchangeably. However, there is a key difference between these two; both are different from cyber security. Application security is a more reactive approach and software security, on the other hand, has a more proactive approach.

How to Become a Cybersecurity Analyst [Complete Guide]

A cybersecurity analyst, also known as an information security analyst, specializes in the security of networks and IT infrastructure. The role of cybersecurity analyst has a relatively broad job description, offering great opportunities for individuals looking to enter the cybersecurity industry and branch out into various cyber-related career paths.

Startup and Stability, Surprisingly now in the Same Sentence?

These are uncertain times in tech. If you’re at one of the many companies in the news recently, think back to why you joined. Was it the people? The tech? Or maybe… the perception of a rock-solid, not-going-anywhere, totally-guaranteed position? Things have changed lately.

Startups! Here's Your Guide to SOC 2: Readiness Assessment

A readiness assessment is the dry run before the official audit, so you can address potential issues before the actual audit takes place. It is not required, buthighlyrecommended to identify any gaps and plan resource allocation. Proper preparation is key – not only will you save time and resources, you’ll ensure a successful audit. Readiness assessments can be conducted by your organization’s internal resources, a CPA firm, or a consulting company.

How to Import your Historical Controlled Documents into Egnyte

‍ If you’re a quality professional then you know that maintaining compliance, audit, and tracking of your controlled documents is critical. When you adopt Egnyte’s Controlled Document Management, you’ll have all of the tools to review, approve, release, and train your users on your policies, procedures, and other controlled docs. But what should you do about all of your existing controlled documents?

Vulnerability Causing Deletion of All Users in CrushFTP Admin Area

During a recent penetration test, Trustwave SpiderLabs researchers discovered a weak input validation vulnerability in the CrushFTP application which caused the deletion of all users. CrushFTP is a secure high- speed file transfer server that runs on almost any OS. It handles a wide array of protocols, and security options. CrushFTP stores details of registered users within the filesystem in the users/MainUsers directory.