VodafoneIdea Limited, a leading Indian Telecom Operator has successfully achieved SOC2 Attestation. After undergoing a rigorous auditing process, VodafoneIdea achieved SOC2 Attestation from VISTA InfoSec, a well-known Global Cybersecurity Consulting, and Certification organization. The SOC2 Audit and Attestation is an assessment of internal controls and security practices conducted by the independent auditors of VISTA InfoSec.
We continue to innovate quickly to help you improve your compliance and security programs. This past month, we launched our own security awareness training video, along with these exciting platform updates:
In October 2022, data center construction reached a record high, reflecting our reliance on collecting, storing, and securing data. This reliance permeates businesses across all industries and puts pressure on data centers storing and processing large amounts of data–much of which is sensitive.
I am yet to meet a CISO who has been given unlimited resources to secure the organization, and in almost all cases, there is more work that can be done to improve security. So given infinite time and resources, how to prioritize the next strategic initiative or project? The increasing maturity of security control frameworks such as those developed by NIST and CIS provide a good structure for maturing a cyber security programme, mapped to preventing common tactics, techniques and procedures .
Attacks targeting the software supply chain are on the rise. Indeed, data from the Mend Open Source Risk Report shows a steady quarterly increase in the number of malicious packages published in 2022, with a significant jump in Q3, which jumped 79 percent from Q2. The European Cybersecurity Agency (ENISA) predicts that supply chain attacks will increase fourfold by 2022.
Dynamic link library (DLL) hijacking is frequently written about by defenders due to its applications in evading automated detections. This technique is even more frequently used by adversaries in interactive intrusions. Despite the wealth of literature available to increase defenders’ awareness of DLL hijacking, CrowdStrike® Falcon OverWatch™ threat hunters see adversaries gravitate toward this tradecraft time and again to load malicious code.