Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Reliability and security best practices for financial services in ANZ

Every year, Australians lose over $6 billion due to financial fraud and cybercrime , so it is great to see the collaboration between banks in Australia to fight fraudsters head-on with the help of the Fraud Reporting Exchange (FRX ). The FRX is a trusted, secure, single platform providing timely and efficient means of reporting and actioning fraudulent (including scam) activities between banks.

Egnyte's Smart Cache v4.0 Speeds up Project Progress with Cache Warming

With Egnyte’s Smart Cache v4.0, you can efficiently warm caches for accelerated project progress. Our new state-of-the-art technology cuts down on wait times and provides ultra-rapid data access, making it easier than ever for architects, builders, and engineers to work smarter, not harder.

CrowdStrike Falcon Platform Achieves Certification in AV-Comparatives' First Anti-Tampering Test

After completing extensive tests designed to evaluate the tampering resistance of enterprise security solutions, the CrowdStrike Falcon® platform has achieved certification in the AV-Comparatives Anti-Tampering Certification Test 2023 for the Windows 10 operating system.

How to use Jit Security as a developer

Welcome to Jit! In this video, we'll explore the developer experience of Jit. Once Jit is installed in your GitHub environment, it scans the changes for each new pull request introduced to the monitored repo or organization based on your company’s security plan. For many findings, Jit will propose an auto-remediation. Click ‘Commit Suggestion’, and the finding will be resolved.

User identity mapping for improved anomaly detection

In any organization, a user may access numerous devices and applications, but not always with the same username or credentials. Devices and applications use platform-specific user registries that are distinct from each other. As a result, organizations may end up monitoring five user identities from five devices separately, while they actually belong to a single user. The table below shows one user, Michael Bay, using different user identities to log on and access various devices and applications.

Mobile App Threat Modeling and Security Testing

As technology progresses and mobile devices become ubiquitous, a remarkably large number of people worldwide are now using smartphones. In fact, current estimates show that 6.8 billion users rely on their phones for an array of activities; but most significantly – 88% is dedicated to app usage! While the above stats show that the mobile app industry is thriving, it's also a matter of concern. Why?