Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Post-CircleCI Breach, Focus on Identity Security Strategy

When news of the recent CircleCI breach broke, developers everywhere scrambled to rotate tokens and remove hardcoded secrets stored in the popular CI/CD platform to minimize their exposure. Now that the dust has settled and more details are available, we’re reexamining the CircleCI attack chain to highlight the importance of a holistic Identity Security strategy in thwarting future damaging attacks.

Elastic + AWS security DevDay: How to secure your data - shared responsibility model

The highest priority for any organization operating in the cloud is data protection. But security is not just the responsibility of cloud providers alone. Organizations need to understand the shared responsibility model, and their role in securing their valuable IP, to avoid compliance chaos.

How Blockchain Technology Is Impacting Cryptocurrency

Cryptocurrencies have become the latest buzz in the online world. Experts are speculating that this new technology will revolutionize the financial system with its soaring crypto prices, and even change the way we live our lives. This article aims to demystify cryptocurrencies, blockchain technology and demonstrate how they interact with each other to create a revolution of their own kind.

Checking In For Disaster: Credential Phishing Campaign Targeting the Hospitality Industry

Since late December 2022, the ThreatSpike team has noticed a significant rise in highly targeted phishing campaigns aimed at the hospitality sector, which distribute infostealer malware. The threat actors (TAs) are primarily targeting front desk and reception staff, as they are responsible for handling customer queries via a generic email that can easily be found on the company website.

The ethics of biometric data use in security

In a world where you can scan the veins in your hand to unlock a smartphone, how do you maintain control over personal data? Biometric authentication, the use of distinctive human features like iris patterns, fingerprints and even gait in lieu of a password, is gaining ground in the tech world. Proponents tout its inherent, hard-to-replicate qualities as a security benefit, while detractors see the same features as an invasion of privacy. Both sides may be right.

Union Budget 2023: How simplified KYC helps with Digital Customer Onboarding

Finance Minister Nirmala Sitharaman advocated for the simplification of Know Your Customer (KYC) processes for financial services in a Budget speech that placed a broad emphasis on technology and tech-driven solutions. She also argued for increasing the utility of the DigiLocker platform for both individuals and businesses and giving Fintech Platforms more flexibility to access India’s digital infrastructure.