Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What's the Difference Between Authenticity and Non-Repudiation?

Authenticity and non-repudiation are two core concepts in information security regarding the legitimacy and integrity of data transmission. Because we transmit data every day, it's important to verify the sender's origin (authentication) and ensure that during transmission, the data was not intercepted or altered in any way (integrity).

Key Steps to implementing ISO 27001

As the leading international standard on information security management, ISO 27001 is an important certification for businesses and is increasingly being demanded by customers as part of their supply chain management. With its standardised processes and reputational status, ISO 27001 shows interested third parties and prospective clients that you take the confidentiality, integrity and availability of their data seriously.

What is Typosquatting? Learn how to defend against it.

Typosquatting forms the basis of cyber attacks that aim to take advantage of users who mistake a malicious website for a legitimate one. Attackers register domain names that are similar to popular brands or products in the hopes that users will mistype the name and end up on their malicious site instead. Once on the site, users may be tricked into providing sensitive information or installing malware.

Data: A New Direction - what is it & what is being proposed?

In 2018, the implementation of the GDPR signalled a seismic shift in how businesses target, collect and store personal data. As individuals entrust businesses with their personal data more than ever before, the GDPR has ensured that the right to privacy for individuals is protected through its regulation. Not since the result of Brexit, and the GDPR ceasing to protect the rights and freedoms of UK Citizens (since 1st Jan 2021), has there been significant changes to the GDPR.

What roles do humans play in cyber breaches

Data is the most valuable asset of any organization, and most employees have access to secure business data. This makes them the first line of defense against combating a cyber-attack. However, hackers target vulnerable employees with insecure devices and sophisticated techniques to access the company's network and compromise valuable data. Human error enables a vast majority of cybersecurity problems. Many employees are already aware of the dangers that their mistakes can pose.

Busting browser fails: What attackers see when they hack your employees' browser

The web browser is probably the most used application on your computer. It’s used for basically everything from checking email, communicating via social media, video conferencing to shopping, banking, gaming, and much more. While we are moving toward a more app-based mobile lifestyle, we are far from getting rid of the traditional web browser.

Solving cloud-based data security challenges

As organisations speed up their cloud migration strategies, security remains a prime concern. Despite the adoption of various security solutions on cloud computing platforms, we continue to see detrimental data losses and cybersecurity breaches being reported. The consequences of such an event range from financial losses and fines, to reputational damages which lead to a loss of market share.

PCI DSS Requirement 1: Summary of Changes from Version 3.2.1 to 4.0 Explained

With the launch of the new PCI DSS 4.0 version, people are still trying to get a grip on the changes introduced and the requirements improvised in the latest version. So, explaining the changes in detail VISTA InfoSec is publishing a series of expert videos explaining each of the requirements of PCI DSS in detail. So, check out the first video that talks about Requirement 1 of the PCI DSS 4.0 version, explaining the updates in detail.#pcidss #pcidss4.0