Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Basics and how to create security groups in Active Directory.

An Active Directory is a database that holds information about the security of an organization. It stores user accounts, and security settings to help organise all the information. Active Directory also stores a list of security groups that are created by the organisation to hold different levels or types of access permissions. Active Directory is a way that you can show people your home. If you are not careful and give too much permission to people, then it can be easy for others to do bad things.

7 Challenges in modern Cybersecurity and how to fix them

Cybersecurity is a leading concern for any business today. While this trend has made IT security a secure and potentially lucrative field, modern cybersecurity professionals also face growing challenges. If you hope to keep your business safe amid rising threats, you’ll have to overcome these obstacles. In that spirit, here are seven of the top challenges in modern cybersecurity and how you can solve them.

Why Digital Risk Protection on Social Media is a Must For Online Retailers

Updated as of June 7th 2021 It's an excellent time to be an online retailer. In 2021, over 230 million Americans will be shopping digitally, positioning the United States as one of the leading e-commerce markets. Social platforms are highly influential with millennials, teens, and Gen Z consumers; 50 percent of college students have purchased on Instagram, and 48% of U.S. internet users aged 18 to 34 years have purchased through social media this year.

Web Application Security 2021: Beginners Checklist to Get Started

Who can deny the importance of security for their website or online store? You may have already implemented some security measures, and you can feel quite complacent about it, but they are far from enough when we consider the security challenges. In recent years, even many leading websites and web apps faced a huge surge of security attacks on their websites.

Colonial Pipeline Hack - What Can We Learn?

It has been reported that the hack that took down the largest fuel pipeline in the United States and led to fuel shortages across the whole of the East Coast was the result of a single compromised password that was leaked on the Dark Web through a data breach. On April 29th 2021, hackers gained access to the network of Colonial Pipeline Co. via a Virtual Private Network (VPN) connection that allowed the hacker remote access to the corporate network.

The Principle of 'Least Privilege' in the World of Cybersecurity

The principle of least privilege in cybersecurity prescribes that no user should have access to system resources beyond what’s necessary for fulfilling a specific task. Adhering to this principle has become essential, as one of the primary ways malicious actors breach a system is by compromising (legitimate) user access.

The Many Challenges of a CISO - The ClubCISO 2021 Information Security Maturity Report

We all have heard and read how the pandemic has disrupted our lives, how it has accelerated digital transformation to an unprecedented extent and how it challenged the existing security policies and practices. The question is how the people responsible for fortifying their organizations experienced the whole situation.

Web application security testing at scale with Coverity SAST

With the rise of cyber attacks on web apps, organizations require AST tools that can help manage web application security and compliance. Remember the saga of Equifax and the unpatched Apache Struts vulnerability? It wasn’t that long ago, and it’s one of the most notorious web application security incidents to date.