Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Look twice before you "LookBack"

What makes great art, whether it be in literature, painting, film, or photography, so challenging and valuable that it seems to be out of our realm of understanding? In any such art, there is more to it than meets the eye. Whether these artists hid some messages for the generations in their art is beyond our knowledge. As the world transitioned into the digital age, we began to use this technique to communicate a lot of information in a single image.

Effectively meeting and exceeding the requirements of the SAMA Cyber Threat Intelligence Principles

Responsible for supervising nearly $1Trillion of assets across 30 banks and financial institutions, SAMA plays a crucial role in ensuring economic and financial stability within the Kingdom of Saudi Arabia. The SAMA Cyber Security Framework and Threat Intelligence Principles are mandatory regulations for all member organisations regulated by the Saudi Arabian Monetary Authority (SAMA) operating within the Kingdom of Saudi Arabia.

Software Developers FAQs on Why to Sign My Code

As a developer, you must have asked, “Why Should I Sign My Code?” when anyone enters into software development, then only they heard about the term – code signing. And then people understand the importance of a Code Signing Certificate. But, the query continues beyond just understanding the definition or using a certificate to sign software digitally. There are a lot more aspects that a developer must know from the questions getting raised by developers present globally.

Random but Memorable - Episode 10.0: One Hundredth Episode Special

We're back with a bang with our 100th episode special! 💯🎉 Come and join the podcast gang as we reminisce over the show's random but memorable history. We also discuss THAT LastPass hack in Watchtower Weekly and talk about 1Password's acquisition of Passage and what it means for a passwordless future. Plus, we finally award our 100th Episode giveaway winners and get more random than ever in a game of Rapid Fire Security Questions! 🤪❓

The SPoF that is DNS

The idea behind “SPoF,” or “Single Point of Failure,” is that if one part of a system fails, then the entire system fails. It’s not desirable. In IT and security circles, if a system or application can be disrupted or degraded severely by the failure of just one component or subcomponent, then we usually deem the design to have a flaw.

Data protection: stricter rules call for an advanced security posture

Data privacy is still unfinished business for many companies. With data privacy laws expanding and tightening globally, compliance has become a complicated process that affects all areas of an organization. Gartner predicts that by 2024, 75% of the world's population will have their data covered by some privacy regulation.

Face Verification: How IDcentral's Face Trace works

Remote, Digital Onboarding is now deemed a “car in the garage” solution to onboarding new customers online. This typically contains a form of Government ID verification and Biometric Check before secure signup(Face Match). But the ” new car in the showroom” solution that you desire is IDcentral’s Face Trace product.