What is Social Engineering? Examples and 12 Prevention tips

Social Engineering, in the context of cybersecurity, is the use of deception to convince individuals into relinquishing their personal information online. This information is then exploited in cyberattacks. Most social engineering campaigns target employees because they could be manipulated into gateways to an organization’s sensitive data. The success of these campaigns relies on a lack of cybersecurity awareness training in the workplace.

A Full Rainbow of Protection: Tripwire Is More than 'Just FIM'

Imagine an arc. Not just any arc. A rainbow. When we think of a rainbow, it conjures impressions of color, inspiration and even supernatural characteristics. Does your cybersecurity program long for a magical pot of gold at the end of a rainbow? With all the moving parts of cybersecurity, sometimes it seems like we are merely chasing rainbows. However, it doesn’t have to be that way.

Best practices for businesses to stay safe online this tax season

It’s tax time again. Typically, the deadline for federal tax filing in the United States is April 15, but this year the deadline has been extended to May 17, 2021. However, if you think your business will be receiving a refund, the IRS encourages you to file as early as possible. Filing taxes can be stressful. Adding to the potential stress is the increasing tax scams out there and the ongoing battle to keep your company data protected and secure.

Training, Accountability and Assessment: Three Priorities for Raising Privacy Awareness Within Your Team

Employees, contractors, and vendors have unparalleled access to company data, requiring careful adherence to data privacy best practices to secure personal information. Unfortunately, many employees are either unaware of these practices or are unwilling (or forgetful) to regularly implement them into their workflows.

Pentest People Win 2 Digital City Festival Awards

On 15th April we were delighted to attend the Digital City Awards online ceremony where we scooped two wins, the Cyber Security Project of the Year and the major award category, The Digital City Innovation of the Year Award. This award recognises the novel product or service which has revolutionised the way things are done and made a real difference in its intended field.

Urgent: 5 CVEs being exploited right now by SVR

The mastermind that orchestrated the SolarWinds attack may finally have a name. On Thursday, April 15th, the White House officially announced that the Russian Foreign Intelligence Service (SVR) - also known as APT 29, Cozy Bear, and The Dukes - was responsible for the campaign that exploited the SolarWinds Orion platform. But the attacks are not over yet. A joint advisory from the U.S.

What is SOAR?

If an individual wants to acquire information about cyber security, or cyber security tools in general, coming across SOAR is inevitable. Since the SOAR abbreviation is all over the place, the importance of it is also easy to recognize. What makes SOAR crucial for cyber security then? In order to answer this question, the full name of the tool should be addressed. SOAR stands for** Security Orchestration Automation and Response**.

Snyk Maven plugin: Integrated security vulnerability scanning for developers

Maven is the most commonly used build system in the Java ecosystem, and it has been for many years. Building your application with Maven is easy since it takes care of many things for you. In different phases of the Maven lifecycle, it handles things like: With Maven, the development lifecycle happens the same way on every machine for every developer on the team, as well as within the CI pipeline.