Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Sensitive Data: What is it, and why you should never share it.

What is sensitive data? Sensitive data can be any type of information that you may not want to share. The scope of what falls into this category is vast, but includes things like your name, address, phone number and social security number. Watch this video for more on the different types of sensitive data and why you should never share it!

MFA everything!

This session will discuss what MFA is, why it is critical to use it for all access, and strategies for implementing MFA across an organization. This presentation will also include a brief demo showing how open source software can be used to help enforce MFA when accessing servers, databases, web applications, and Kubernetes clusters. Speaker: Jonathon Canada.

Cybersecurity: When Stress and Trauma 'Get in the Way'

This blog contains a discussion about stress, trauma, and domestic violence. This may be difficult for some readers, and given the alarming figures around Post-Traumatic Stress Disorder (PTSD), trauma, and early life experiences (ACEs), this will likely concern at least a small population of readers. Please take care of yourself when reading this and break off from reading if you feel the need to.

The Essential Guide to Slack Data Loss Prevention (DLP)

DLP ensures confidential or sensitive information (like credit card numbers, PII, and API keys) isn’t shared outside of Slack by scanning for content within messages and files that break predefined policies. DLP is important for both security and compliance reasons. With DLP in place, you’ll be able to.

What are the Types of Cyber Security Vulnerabilities?

As the threat landscape changes and advances with time, being able to address the most common types of cyber security vulnerabilities has gained the utmost importance. In this article, we will consider various types of cyber security vulnerabilities and how you can mitigate them. As information becomes an organization’s most important asset, cyber security gains increasingly more priority.

Cybersecurity Architecture: A Complete Guide to Preparing Your Organization for a Cyberattack

What is cybersecurity architecture? Is your company's cybersecurity architecture prepared for the future? This video will give you everything you need to know about how to prepare your organisation and make sure it is ready for any threats in the years ahead. Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.