Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Demystifying Security Validation Technologies: What You Need to Know About Automated Pen Testing

You can’t predict the future, but you can prepare for it. When it comes to IT (and OT), security validation is the closest to predicting the future as you can get. This is the second post in our series “Demystifying Security Validation Technologies: What You Need to Know,” in which we break down a number of security validation methods available today, provide the strengths and weaknesses of each, and explain how each functions in different IT environments.

Innovation in Cybersecurity: Building a Secure Digital World

Our mission is to build a secure digital world - but when we think about the future, we realize it can't happen without intelligence. Today, cyber threats haven't been tamed, and to get to a point that they are, involves a collective effort globally to solve for them. How? By thinking differently. Join us in building a future in which neutralizing cyber threats is the norm as our security solutions protect us.

Obrela at Delphi Forum || Panel Discussion

George S Daglas, Vice President, Chief of Strategy & Customer Success Officer, at Obrela participated on 28 April in the panel discussion on #cybersecurity in Greece powered by the findings of a brand new research by Metron Analysis S.A. at Delphi Forum with the kind support of Vodafone. We had the opportunity to discuss the key concerns about the security of #data and #cybersecuritytrends both in Greece and abroad deriving from our international experience and how to best action next steps for businesses and users.

Shine a Light on Shadow IT: Vanta Launches Category-First Vendor Risk Management Solution

Delivering a single platform to assess vendor risk, automate security reviews and remediate issues. Supercharged Access Reviews ensure the right users have access to the right systems. AI-powered Questionnaire Automation increases accuracy and reduces time-intensive tasks.

World Password Day: Tips, quiz, and tools to improve password security

Password security, though sometimes underrated, is crucial for an organization to remain viable in the vast digital landscape. A popular quote on the internet says, “A good neighbor is someone who does not put a password on their Wi-Fi.” However, for a good company, the opposite holds true, as they must thoroughly secure all their resources.

Featured Post

Password Managers: Here to stay?

Password managers have become popular solutions for businesses and individuals seeking to improve the password security of their accounts. The implementation of password management solutions within organisations has enabled security teams to securely store and manage company credentials for online and offline applications by using advanced encryption.

Zero Trust Security in Active Directory and Azure AD Groups

One important way of securing your organization against attacks and other cyber threats is to implement a Zero Trust security model for groups (distribution lists, security groups, Microsoft 365 groups) in on-premises Active Directory and Azure AD. After all, these groups control access to your IT assets, from sensitive data to vital communications channels and tools like Microsoft Teams and SharePoint.

How Does a WAF Work?

WAF ( Web Application Firewall) is the first line of defense between the app and the internet traffic. It monitors and filters internet traffic to stop bad traffic and malicious requests. The WAF is a crucial security solution that ensures the availability and integrity of web services. It functions as a reverse proxy by serving as an intermediary that safeguards the web app server against malicious clients.