Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

The Most Important Security Metrics to Maintain Compliance

Every week, dozens of data breaches are reported with some reaching into the tens, or even hundreds of millions of individuals impacted. Customers and regulators alike are increasingly concerned about the information security programs of organizations and how they plan to prevent security incidents and safeguard sensitive data.

The State of the Cybersecurity Market: Where We've Come, Where We're Going

There’s an interesting trend that I have personally noticed over the past few years: organizations are starting to take cybersecurity more seriously. With the multitude of high-profile data breaches, organizations are starting to realize that cybersecurity is a significant risk to the business. This allows CISOs and other similar titles with leadership responsibilities to have a larger budget for people, process improvements, and supporting technologies.

What Is Multi-Factor Authentication, and What Does It Have to Do with You?

Security isn’t a simple matter of caring or spending time reading manuals or being told what you can or can’t do. Security is understanding how to view the world from a different perspective. It’s a skill that people build over time, and it’s completely appropriate to start out small. If you can do nothing else, consider the access to your accounts, professional, banking, and social media. Consider how hard a malicious actor needs to work to gain access to these.

Working from Home during COVID-19? What You and Your Organization Need to Consider

First and foremost, our hearts go out to those around the world impacted by the COVID-19 virus. The director of the U.S. Center for Disease Control & Prevention (CDC), who advises the country on public health, has indicated that the risk to the general public remains low and encourages Americans to go about their lives. Businesses and local communities are taking a much more personal approach.

Undetected podcast e.01 recap: The evolution of web security and hacking

In the pilot episode, Laura is joined by Detectify co-founder Johan Edholm. He co-founded the company back in 2013, and is still involved with the organization today by managing the technical infrastructure in the clouds. We don’t want to give away too much, but there are some things said that are just too good to not be highlighted and we’ve summarized of some of the conversation.

What is Encryption?

Encryption is a technique employed for keeping sensitive and private information safe, such as passwords, identity information, credit card details. In this article, we will explain what encryption is in detail. As a member of the society in the 21st century, you must have accounts on some online platforms or done online shopping at least once in your life. Have you ever wondered how your sensitive information like credit card details, passwords and such are kept safe in such platforms?

Malicious Actors and Medical Data: Where Are We Heading?

Data is the hottest commodity in town, particularly on the dark web. But there’s one type of file that hackers are most interested in: your medical data. Whereas a credit card number or Social Security number can net a criminal $1-$15 depending on the data type, medical records can sell for the equivalent of $60 each (in Bitcoin). What’s more, the theft of these files isn’t uncommon. Despite U.S.

15 Considerations for Cybersecurity Risk Management

Each year brings new cybersecurity threats, data breaches, attack vectors, and previously unknown vulnerabilities. Even with zero-day vulnerabilities like EternalBlue, the approach to dealing with cyber threats is the same: sound risk management framework with a systematic approach to risk assessment and response. Cybersecurity risk management takes the idea of real-world risk management and applies it to cyber risks.