Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Round up of the Singapore Digital Economy Agreement Mission 19th-22nd September 2022

From the 19th – 22nd September, Amit Rao, Vice President – Sales & Business Development Asia, was asked to be part of the UK’s DEA Mission delegation to Singapore, on behalf of Device Authority. The delegation comprised of high growth legal, cyber and safety tech companies.

How To Store Employee Personal Data Securely and Why It Matters

As an employer, you have both a moral and legal obligation to shore up sensitive information about your employees. Sensitive information includes genetic and biometric data, medical records, SNNs (social security numbers), and criminal history records, just to name a few. Fail to do so, and you will open yourself up to loads of risk. Hackers are constantly on the hunt for applicant and employee data that they can further sell on the dark web or use to perpetrate fraud.

Unify vulnerability detection and remediation with the ManageEngine-Tenable.io integration

According to the latest Ransomware Spotlight Year End report, 56% of the 223 older vulnerabilities identified prior to 2021 are still actively exploited and used as the entry points to ransomware attacks. This warrants the question of why enterprises aren’t patching vulnerabilities regularly.

ProxyNotShell-Microsoft Exchange Vulnerabilities

On September 29, Microsoft Security Threat Intelligence reported two significant zero-day vulnerabilities being exploited in the wild. The two vulnerabilities, named “ProxyNotShell”, affect Microsoft Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019.

See Yourself in Cyber - Welcome to Cyber Security Awareness Month

October is Cybersecurity Awareness Month, which is a good time for everyone to re-evaluate their security procedures and technologies, and the role that they want in their personal and corporate cybersecurity practices. This year’s theme is “See Yourself in Cyber.” At WatchGuard, we take that to mean that all of us, regardless of our role or responsibility, can make a positive contribution to a safer and more secure online world.

5 ways to Prevent Fraud against CNP Transactions

Digitalization has catapulted customer purchasing transactions to an unprecedented level. Online transaction payment methods have become so convenient that they have led to an unstoppable buying spree by consumers. These days there is nothing that can stop a desirous buyer from purchasing, probably not even when ‘he is not carrying plastic money or cash, as he has the option to pay using card data.

Sponsored Post

Why Composable Analytics Matter for Multi-Cloud AIOps

There’s plenty of loaded terminology and buzzword bingo when it comes to the latest advances in cloud application delivery. Especially when it comes to multi-cloud – which should merely mean multiple cloud instances when modern cloud applications really leverage multiple hybrid IT operating models, atop both existing business silos and newer microservices application workloads.

What is Enterprise Code Signing Certificate [A Detailed Guide]

Each business today requires user data to provide a better customer experience. The widespread use of data has triggered cyberattacks so much that they have become a part of software too. As per stats, there were 121 ransomware attacks in the first half of 2021. And these attacks are primarily in the form of fake software. This is where code signing and Enterprise Code Signing Certificate come into the picture.

1Password SCIM bridge explained: what it is, and why we made it

The 1Password SCIM bridge is a powerful tool for businesses that want to use a password manager alongside an identity provider like Okta, Rippling, or Azure Active Directory. But if you haven’t used the SCIM bridge before, you might be wondering: What exactly is it? And does my company need a SCIM bridge?

Top Password Hygiene Best Practices for Remote Workers

With a growing number of organizations offering a remote or hybrid working option, many people are taking their workspaces home. Your team needs to know password hygiene best practices to ensure their home work environment is secure and protected. Sloppy employees who are not knowledgeable about password hygiene can pose a risk to themselves and their company. In fact, 82% of breaches involved a human element, according to Verizon’s 2022 DBIR.