Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

opsdemon

Latest posts

Women in Technology featuring Roopa Naidu, Senior Technical Project Manager @1111systems

"Be bold and put yourself out there. Seek support and mentorship from people willing to help you grow in your career. Having a vision for your career and going after it is crucial in this industry." - Roopa Naidu, Senior Technical Project Manager, Development At 11:11 Systems, we recognize the value of diversity and the unique contributions of our female employees. We’re pleased to feature some of our outstanding women in a series of Q&A blog posts, showcasing their experiences, insights, and impact on the tech industry.

Cyber Resilience @1111systems with Kaushik Ray, Chief Experience Officer @Sungar

"The balance of proactive and reactive measures is how you get cyber resiliency. Cyber resiliency is equal to cybersecurity plus cyber recovery." Hear from 11:11 Systems' Chief Experience Officer Kaushik Ray on what cyber resilience at 11:11 means for our customers.

CMMC Auditor vs Assessor (CCA): How the Two Compare

The full compliance process for CMMC, the Cybersecurity Maturity Model Certification, culminates in an audit that validates an organization’s cybersecurity posture and its implementation of the security controls that apply to it. Throughout this process, there is a gatekeeper who performs your audit. You may have heard of them referred to as a CMMC Auditor or a CMMC Assessor. With these two terms in play, you may be wondering what the difference is between them.

How to Lock Your Social Security Number Safely

Identity thieves will do anything to get your Social Security Number (SSN). It's a very important piece of personal information. Locking your SSN is a proactive way to protect your name and money from fraud. The Federal Trade Commission (FTC) says that over 1.4 million Americans were victims of identity theft in 2022. Many of these crimes involved stolen Social Security numbers. To lower these risks, you need to learn how to safely lock your Social Security Number.

Time Out for TikTok: An exploration of the risks presented by the US TikTok ban

On 13 March 2024, the US House of Representatives approved a bill which demands that the China-based ByteDance divests the popular social media platform TikTok, effectively banning it in the country. The measure was passed with a 352 to 65 vote after being introduced on 5 March 2024 by Republican Mike Gallagher and Democrat Raja Krishnamoorthi.

ConVErsations: Criminal Discussion of Vulnerabilities and Exploits

Defenders often discuss security vulnerabilities on GitHub, Stack overflow, X (formerly Twitter), and other platforms to share knowledge of these threats and ensure users know when patches are available. Cybercriminals have a similar process, choosing to share vulnerability news, exploit code, and engage in technical discussions on cybercriminal forums. However, in contrast to defenders, these threat actors share this knowledge for the purpose finding unpatched systems and exploiting them.

EP 69 - Cloudy with a 100% Chance of Secrets: Decoding Secrets Management in the Cloud

In this episode of the Trust Issues podcast, host David Puner dives into the complexities of secrets management with Ritesh Desai, General Manager at AWS Secrets Manager. They discuss the evolving landscape of secrets management, emphasizing the importance of a multi-layered defense strategy as organizations increasingly adopt cloud services, digital transformation and agile development practices.

Enhance Your Security Posture with Microsoft Azure Native Tools and Tanium

When it comes to securing your business, visibility into your company’s devices is key. As we so often say, you can’t protect what you can’t see. What’s more, visibility into your devices needs to be accurate and current – your IT security and operations teams can’t protect your environment if they’re working from data that’s hours (or days or weeks) old.

Internxt Becomes The First Cloud Storage With Post-Quantum Cryptography

Internxt is proud to be one of the first cloud storage companies to protect business and individual data with the world’s most advanced encryption, post-quantum cryptography. Our post-quantum encryption protects your files and data from the potential threats of quantum computers that hold the power to break current encryption protocols due to their superior ability to solve complex algorithms in minutes or even seconds.