Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Defining and Defending Against a Zero Day Attack

Unexpected attacks are the hardest to fend off. In the realm of cyber, Zero Day vulnerabilities are among the greatest risks, as these software flaws are unknown and exploited before a fix is available, potentially compromising the thousands of organizations that are unwittingly using vulnerable software.

Ep 21: How to start a threat program

In this Masters of Data episode, we welcome back Chas Clawson to discuss building effective threat hunting programs from the ground up. We explore the difference between proactive threat hunting and detection engineering, emphasizing how AI tools are making sophisticated security operations accessible to teams of any size. We cover practical approaches, such as prioritizing threats based on business risk, creating feedback loops between red and blue teams, and measuring success through meaningful metrics rather than vanity numbers.

Why Account Takeover Is a CX Problem, Not Just a Security One

Account takeover is usually and unsurprisingly approached as a security incident, yet much of the customer impact begins earlier in the journey, long before security teams detect or analyse the event. When users face friction, lockouts, or unexpected changes to their accounts, trust starts to erode. This makes the account takeover impact on customer experience a major determinant of brand trust and loyalty.

What is VoIP and How Does it Work?

Your phone rings. The number looks local, even familiar - so you answer. But within seconds, you're being asked to “verify your bank account” or “reset your login credentials.” Sounds suspicious? It is. That call likely came from a VoIP number, which is not a regular phone line. VoIP (Voice over Internet Protocol) lets anyone make calls over the internet, not just through mobile networks or landlines.

How Generative AI is Changing the DLP Landscape

Generative AI has revolutionized productivity, but it has also introduced a new class of data risk that legacy DLP tools simply can’t see. From engineers pasting source code into ChatGPT to marketers rewriting strategy docs, sensitive IP is leaving the browser through "Shadow AI" channels daily. Learn why traditional pattern matching fails against LLMs and how a data lineage approach secures AI usage without halting innovation.

Mend.io + Wiz: A New Code-to-Cloud Integration for Accurate, Context-Driven Risk Prioritization

Today, we’re excited to announce the availability of Mend.io’s new integration with Wiz, delivering a powerful Code-to-Cloud security workflow for joint customers. By bringing Mend SAST’s high-accuracy code findings directly into the Wiz platform, organizations can now unify code-level risks with cloud posture, runtime context, identities, and infrastructure—unlocking the complete picture needed to prioritize and remediate risk with confidence.

The 9 Best Endpoint Security Solutions

Endpoint security solutions are specialized software designed to protect endpoint devices like computers, mobile phones, and tablets from cyber threats. These solutions prevent, detect, and respond to attacks by managing the security of these devices across the network. But with so many different endpoint security solutions available in the market, how can you know which is the right fit for your endpoint security strategy?

Your SaaS Integrations are Leaking Sensitive Data - Salesloft /Salesforce incident #aws #apisecurity

The Salesloft/Salesforce incident revealed the danger of BLA 5: Artifact Lifetime Exploitation. The flaw is simple: the application fails to expire tokens and sessions properly. Stolen OAuth tokens that should have been short-lived were used to steal AWS keys, Snowflake tokens, and passwords. Key Takeaway: If an artifact is meant to be short-lived (a token, a session, a temporary file), it must be retired immediately upon expiration. Rotate your keys aggressively!

The Australian startups guide to ISO 27001

Not sure whether your Aussie startup needs to obtain an ISO 27001 certification? ISO 27001 isn’t legally required, but if you plan on trading internationally or have potential customers who are international, many organisations won’t even open conversation with you if you don’t have an ISO 27001 certification. ‍ To put a long story short: if you collect, store, transmit, or process data in any way, you may want to consider it.