Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

A battle or a coalition? Proactive vs reactive cybersecurity

Many businesses are starting to investigate proactive vs reactive cybersecurity methods. Reactive cybersecurity strategies have been effective in the past when dealing with incidents and remain relatively effective where known threats are concerned. The problem is that cyber criminals are now aware that businesses are already prepared for known threats and are actively improving and evolving their cyber-attack methods to evade detection.

Humans can never be as quick or as intelligent as bots when it comes to identifying threats

Originally posted on CyberNews. As more businesses race to shift their operations online, new website owners have to adapt to a new way of doing business and deal with a variety of online threats. While most of us think of disrupted websites or servers going offline when we hear the words “bot attack,” the reality is often different.

Cybersecurity Sessions recap: Artificial Engagement and Ad Fraud

In a recent episode of the Cybersecurity Sessions podcast, Netacea CTO Andy Still quizzed Beacon CTO Stewart Boutcher about ‘artificial engagement’, a term Stewart has championed as a member of the Data and Marketing Association North Council. Artificial engagement refers to fake clicks and impressions generated by bots on ad networks, costing marketeers huge chunks of their digital advertising budgets.

How to create a strong cybersecurity culture in your organization

The cybersecurity culture of an organization encompasses the knowledge, awareness, attitudes and behaviors of employees regarding the threat landscape, cybersecurity and information technologies. Strong cybersecurity culture starts with building awareness and encouraging best practice cyber-hygiene, normalizing these behaviors so they become second nature to your team.

Why Zero Trust is the future of corporate cybersecurity

In a world driven by digital business, enterprise security needs to be continuously monitored and improved to keep up with evolving cyber-threats and to ensure data protection across the web. As the corporate, office-based workforce evolves to become more permanently remote, increased access control to business assets is needed for those both within and outside of the company network.

How Artificial Intelligence is Changing Cybersecurity

The impact of AI on cybersecurity continues to be a hot topic of discussion within the information security industry. Cyber-threats are rapidly increasing in volume. In part, this is because the attack surface for cybercriminals is huge, and it continues to grow and evolve at a lightning pace. Every year billions of cyber-attacks are launched with a wide variety of motives, and new threats with more sophisticated tactics or methods are trialed to bypass existing security systems.

Why you need to pay attention to mobile app security

Aside from executing physical attacks on servers, hardware or people, there are three main access points where criminals can break into systems: web, mobile and API. In this post, we’ll focus on mobile security, an area increasingly being exploited due to a sharp rise in mobile device use over the course of the pandemic.

How OpenBullet is used and abused by cybercriminals

OpenBullet is a testing suite of software allowing users to perform requests on a target web application. The open source tool can be found on GitHub and is used by businesses for various legitimate purposes including scraping and parsing data and automated penetration testing. Although designed to aid security professionals, in the wrong hands OpenBullet can be abused for the opposite purpose.

How Machine Learning has become essential in stopping spam and bots

Spam filters are essential. Without them we couldn’t cut through the noise of phishing scams and malware links to read our messages. Hatred of spam is well entrenched in society, just as bots (especially scalpers) have become the bane of so many lives in recent years. There are several parallels between the email spam in our inboxes and malicious bots that crawl the web. Both are designed to cause harm to businesses and individuals. Both exploit systems designed to be useful.