Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is ACME Protocol and How does it Work: A Complete Guide

You might have visited a website and seen a warning that says: “Your connection is not private.” This often happens when a website’s security certificate has expired. It is a small oversight that can harm a website’s reputation and make visitors think twice before proceeding. For website owners, managing digital certificates manually can be a real challenge. To simplify this process, the ACME Protocol was developed.

Reimagining the Role of the CIO in Business-led IT

This blog is a follow-up to the post Opportunities & Risks for Digital-first Leaders in Business-led IT The days of shadow IT as an unregulated threat are over. Business-led IT represents a fundamental shift in how organizations innovate and operate. To succeed in this new reality, CIOs must embrace what I call the “New CIO” mindset.

Assessing Your Readiness for SSE Implementation

Your workforce is remote or hybrid, logging in from their homes, coffee shops, or random public networks, using cloud-based applications. Your data is increasingly being stored in the cloud, accessed from anywhere, traveling to who-knows-where. And your security is lagging behind. More than 90% of organizations have moved assets to the cloud, yet legacy security solutions are too complex and ultimately inadequate to secure the digital transformation.

The Evolution of Fraud: How Deepfake Technology is Changing Cybercrime

As a former black hat hacker, social engineering and phishing concepts are not new to me. I have used these techniques in my previous life, so I know their effectiveness. Having spent years immersed in the intricacies of social engineering, I’m always looking for new twists on this age-old technique.

Weekly Cyber Security News 30/01/2025

Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! I’m always fascinated by these low level side channel attacks. Though of course, if you are affected by them, then perhaps not so fascinating.

How Lack of Cybersecurity Training Makes Small Businesses Easy Targets

Small businesses may think they don’t need to implement cybersecurity training programs because larger enterprises with more revenue are more profitable for bad actors. However, small businesses lacking essential security measures are prime targets due to the ease of access and fewer resources for investigation and remediation.

January Release Rollup: Copilot - Knowledge Base Reports for Admins, Preview Analytics, and More

We’re excited to share new updates and enhancements for January, including: For more information on these updates and others, please read the complete list below and follow the links for more detailed articles.