Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CIS Control 01: Inventory and Control of Enterprise Assets

Since 2008, the CIS Controls have been through many iterations of refinement and improvement leading up to what we are presented with today in CIS Controls version 8.1. CIS Controls reflect the combined knowledge of experts from every part of the ecosystem (companies, governments, and individuals). The controls reflect consideration by people in many different roles, such as threat analysts, incident responders, solution providers, policy-makers, and more.

Malaysia's Data Sharing Bill 2024: Pioneering Secure and Efficient Government Collaboration

In December 2024, Malaysia passed its Data Sharing Bill 2024, a new piece of legislation aimed at streamlining data-sharing across federal government agencies. This bill promises to revolutionize how data is managed, shared, and secured within Malaysia's government, fueling a more efficient, innovative, and secure public sector.

1Password Enterprise Password Manager - MSP Edition now available to all MSPs

Big news for managed service providers (MSPs): You can now protect your clients with the enterprise password manager trusted by over 150,000 businesses. 1Password Enterprise Password Manager – MSP Edition is available to all MSPs, and you can try it free for 14 days. It’s an exciting and challenging time to be an MSP. Tech stacks are growing to unwieldy sizes, remote work is the new norm, and ransomware and its associated costs are rising.

What Is Two-Factor Authentication (2FA)? Definition, Types, and Benefits

Passwords alone are no longer enough to protect your IT environment. With cyberattacks becoming more sophisticated, two-factor authentication (2FA) has become essential to today’s cybersecurity strategies. It verifies who users are by requiring two different forms of identification, adding an extra layer of security to your accounts and systems.

Fireblocks Celebrates 5th Year on the Forbes Fintech 50

We’re proud to announce that Fireblocks has been named to the Forbes Fintech 50 for the fifth year in a row. This recognition highlights our ongoing work to transform the world of digital asset security. Being included on this prestigious list reflects the significant progress we’ve made in providing a comprehensive suite of tools for managing digital asset operations, along with a full development platform to help customers build a wide array of businesses on the blockchain.

A Guide to Working in Threat Intelligence

According to Gartner Research and McMillan (2003), “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or emerging hazard to assets that can inform decisions on how to respond.” Threat intelligence involves analysing data to predict and prevent cyber threats, allowing organisations to identify risks early and implement proactive defences.

Who Is Winning the War with AI: Bots vs. CAPTCHA?

For years, CAPTCHA has been the mainstay of online security, blocking bots from invading websites. Since its introduction in 2007, CAPTCHA has continued to evolve in its fight against advanced automated threats, and Google's reCAPTCHA has been at the forefront. From being highly human-friendly to highly bot-unfriendly, the game has completely changed with the introduction of AI capabilities. Thus, the sensitivity towards CAPTCHA is at high stakes with respect to its survival in the detection of bots.

Latest GitLab Vulnerabilities: A Gateway for FOG Ransomware Attacks?

The future cyber threat is not static and appears to exploit vulnerabilities with fresh ransomware gangs and devastate businesses all over the world. One of such infamous gangs, Fog Ransomware, is currently dumping sensitive data of several businesses, recent attacks including GitLab deep. Foresiet security researchers believe that Fogs recently exploited Gitlab Cve perhaps they employed a fresh or unfixed zero-day vulnerability in GitLab.to launch its attacks.