Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Preparing for a World Without the Public Services Network (PSN)

Anyone who works in technology in the United Kingdom (UK) is familiar with the Public Services Network (PSN). This organization was established back in 2008 to help public service organizations to work together to share resources and reduce duplication. Over time, the Internet has become suitable for most of the work that was previously managed by the PSN, and the PSN is now considered a legacy network.

Five worthy reads: Cybersecurity mesh-An extension of the Zero Trust Network

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week let’s zoom in on cybersecurity mesh, which brings a twist to the existing security architecture with a distributed approach.

Why security scare tactics aren't effective - and what to do instead

We hear a lot about the consequences of practicing poor security. And for a while, this was rightfully so. When the importance of cybersecurity was still emerging, many people didn’t understand what could happen if they weren’t following proper security procedures.

Weekly Cyber Security News 05/11/2021

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. Further developments in unexpected way on the leak of potential UK gun holders. The company in light of the disaster quite blatantly it appears has filed for insolvency and reincorporated to avoid any come back. That alone is quite something, however to sort of admit that on Facebook is well… Unfortunate…

What is a Keylogger? How they Work and How to Stop Attacks

A keylogger is a type of spyware that monitors and records user keystrokes. They allow cybercriminals to read anything a victim is typing into their keyboard, including private data like passwords, account numbers, and credit card numbers. Some forms of keyloggers can do more than steal keyboard strokes. They can read data copied to the clipboard and take screenshots of the user's screen - on PCs, Macs, iPhones, and Android devices. Keyloggers are not always the sole threat in cyberattacks.

Outpost24 acquires Specops for enhanced user security and secures further funding to continue growth

Outpost24 today announced the acquisition of Specops Software, a leading provider of password management and user authentication solution, as well as securing another SEK 50 million funding from Swedbank Robur and Alcur Fonder.

Why retailers must adopt a Zero Trust approach during this holiday season

The pandemic accelerated a trend that was already gaining increased traction: the preference for shopping online. The last eighteen months have brought a surge to the eCommerce industry, with consumers of all ages learning how to order items online. Competition has never been fiercer for online retailers, which means it’s not just quality products and customer service that companies must focus on.

Crowdsourced security is now a need, not a nice to have

It takes a crowd to secure the attack surface. Detectify collaborates with the Crowdsource ethical hacker community to power a fully automated external attack surface management solution. This is a guest blog post from Crowdsource hacker Luke “hakluke” Stephens on why he believes crowdsourced security is now a necessity.