Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

5 Top Microsoft Teams Security Concerns

Are you worried about rolling out Microsoft Teams? Are you concerned that users may accidentally share the wrong information with Team members? Your concern is justified with 56% of insider incidents caused by employee or contractor negligence at a cost of $484,931 per incident (2022 Ponemon Cost of Insider Threats Global Report).

Step up Your Payment Security with Penny Drop Verification

The efficacy of customer identity verification has increased thanks to digital technology. Validating a bank account is an essential stage in the identity verification process since it verifies the client who is tied to that account. The traditional procedures for validating a bank account involved a lot of paperwork and several bank visits, and they were time-consuming. Financial institutions may now enrol consumers in only a few minutes thanks to the introduction of penny drop verification.

Navigating software due diligence with a Black Duck Audit

A Black Duck Audit provides a complete picture of the software risks in your acquisition target’s software or your own. Deciding on the best approach to managing software due diligence can be a significant challenge for organizations. Frequent acquirers have a playbook, but every transaction is different, and approaches must evolve as the market changes.

PowerShell Tips and Tricks for Scripting in Active Directory Test Environments

PowerShell is one of the most efficient management methods in the Windows Server world. This article offers tips and tricks to learn about one of the most common scripting scenarios: using PowerShell in test, demo and quality assurance (QA) environments, which frequently need to be rebuilt or adjusted to fit a new need or process. We’ve chosen the most useful PowerShell tips based on real-world experience with colleagues and customers.

What is Cyber Hygiene?

Cyber hygiene refers to cybersecurity best practices that both businesses and individuals implement to maintain the security and health of their accounts, networks and devices. Having good cyber hygiene protects you from common cyberthreats and cyberattacks that target you and your sensitive data. Continue reading to learn more about cyber hygiene, its importance and how you can benefit from practicing good cyber hygiene.

Keeper Connection Manager: From the original developers of Apache Guacamole

In February of 2021, one of the operators at the City of Oldsmar’s water treatment system noticed a change in the water supply. The level of sodium hydroxide was abnormally high, which would have been lethal for residents if ingested in large amounts. Quick to react, the operator was able to reverse it before any damage was done.

How to Fuzz JavaScript with Jest and Jazzer.js

In this post, we will show how you can write fuzz tests for your JavaScript projects in Jest as easily as regular unit tests. To make this possible, we have added integration for Jazzer.js into Jest, which enables you to write fuzz tests using the familiar Jest API. Additionally, you get great IDE support with features such as debugging and test coverage reporting out-of-the-box. This integration enables a smooth user experience with the advanced fuzzing technology provided by Jazzer.js.

How CI/CD-Integrated Fuzzing Improves Automotive Software Security

As vehicles are becoming increasingly dependent on software, automotive software teams are adopting CI/CD (continuous integration and continuous deployment/delivery). This enables them to build, test, and deploy code faster than ever while simultaneously reducing potential maintenance costs. In automotive projects, functional and security bugs can be highly consequential, especially if they are found in the later stages of software development or, even worse, after shipping.

Four Reasons Large Organizations Are Susceptible to Cyber Attacks

A great deal of focus in the cybersecurity industry is placed on the dangers threat actors pose to small and medium-sized businesses. For good reason, too. These organizations often lack the budget and staffing required to provide 24×7 monitoring, detection, and response, leaving them exposed to attack. These same factors can find them incapable of mounting a robust incident response plan post-breach.

8 Least Invasive Phone Apps: The Best Apps for Hiding Your Data

For most smartphone users, cybersecurity is often an afterthought. It takes seconds to download any app, and most users simply don't have the time or ability to look out for invasive apps on their phones. Instead of sitting down and researching the security features of every app you might be interested in or going back and forth choosing between different apps based on cybersecurity, it's best to just download apps that are known to be non-invasive.