Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Open Source Risk Management in the Financial Sector

Banking has changed. In the past, financial institutions outsourced their technology. They had large consulting firms creating, managing, and maintaining their back-end systems. Although banks would have knowledge of the systems in place, they wouldn’t be running them on a day-to-day basis. That was the consultants’ responsibility. Recent years have seen a significant shift in the financial sector.

The biggest threat to modern society - and its not Covid

5G robots began their first scouts around Singapore’s luxury neighbourhood Keppel Bay last month - a trend that will spread globally in the years to come. These autonomous robots came in several forms, and were adapted specifically for a variety of duties that gave ground staff a chance to perform their duties via proxy, away from the hot tropical sun. This included monitoring water quality, garbage collection, and security surveillance.

Discover How the Arctic Wolf Platform Facilitates HIPAA Compliance

For healthcare organizations, cybersecurity isn’t just about staying safe and protected from evolving cyber threats—it’s also about staying compliant. The most well-known healthcare regulation of them all is the Health Insurance Portability and Accountability Act (HIPAA), which recently celebrated 25 years on the books.

How Lack of Awareness and Clinging to the Past Threaten Your Networks

The security landscape is always changing. New features are coming out all the time, but often backward compatibility is maintained too. What this means is that while the new features may be present and active by default, it's possible for users to be completely unaware of them and continue using the legacy functionality.

Understanding Security Service Edge (SSE) and SASE

The SASE journey requires reliable partners with truly integrated platform capabilities, not vendors wielding smoke-and-mirrors-style marketing proclaiming “SASE” in giant headlines. But clarity is critical, and both SASE and the more-recently-coined security service edge (SSE) terminology, can be a little confusing.

Microsoft warns of a Windows zero-day security hole that is being actively exploited

In a security advisory, Microsoft has warned that malicious hackers are exploiting an unpatched vulnerability in Windows to launch targeted attacks against organisations. The security hole, dubbed CVE-2021-40444, is a previously unknown remote code execution vulnerability in MSHTML, a core component of Windows which helps render web-based content. According to Microsoft, attacks exploiting the vulnerability have targeted companies via boobytrapped Microsoft Office documents.

Anti-Money Laundering Compliance in 2021: How Transaction Monitoring Can Help You Keep Up with Emerging Threats

Every year, 2%-5% of the global GDP, or US$800 billion-US$2 trillion is being laundered across the globe. That’s almost equivalent to the GDP of Canada (1,643.40 billion USD in 2020) or Italy ($1,886.45 USD in 2020). Neither the record-breaking heat, nor the intense floods experienced around the world this summer seem to have stopped financial criminals from inventing new ways to hide illegal sources of their income.

Minimizing The Risk of Cyber Attacks with Network Security Analytics

Cyber attacks come in many forms, but they almost always share one trait in common: they are carried out over the network. Although there are exceptions, the network is usually the entry point that attackers use to launch whichever exploits, data thefts, or other intrusions they aim to impose upon a business.

Technology Professionals in Short Supply - 3 Tips to Retain Yours

In an article posted on the organization’s website, the Center for Strategic and International Studies (CISI.org) reported that, as of January 2019, the United States had 314,000 more available cybersecurity positions than it had trained professionals available to fill them. That was an increase of over 50% since 2015.