Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Bridging the Gaps of Grey-box Fuzzing | FuzzCon Europe - Automotive Edition 2022

Li Yuekang from NTU Singapore, & Dr. Sheikh Mahbub Habib from Continental present this talk. Software testing typically requires these three steps: Researchers have been focusing on improving the test case generation and execution feedback analysis while the topic of target program execution is under-studied, because executing the target program seems to be an easy task. However, through industry practice, they find that target program execution can be challenging for libraries or IoT software.

Threat Intelligence: Why Awareness is Critical, and Collaboration is Essential

Collecting information on cyber threats and analysing data on a regular basis is essential to ensure your defenses are tight and to allow you to pre-empt potential attacks. Richard Cassidy and Josh Davies, experts in the cyber threat intelligence field, join us today to discuss how collaboration between cyber professionals when it comes to data and intelligence is essential for keeping your environment secure in a world where threats evolve on a daily basis.

1Password: Why your business needs a password manager in 2023

With more than 82% of data breaches involving a human element, it's never been more important for companies to focus on improving the security habits of the people within their organization. Whether you're just starting your security strategy, or working to improve existing security measures, this webinar will cover the importance of implementing a password management solution in 2023 and beyond.

ManageEngine wins at the Cybersecurity Breakthrough Awards 2022!

It gives us immense pleasure to announce that ManageEngine has been declared a winner in the Cybersecurity Breakthrough Awards 2022. ManageEngine ADAudit Plus, our IT security and compliance solution, was the winner in the User Behavior Analytics Security Solution category. The Cybersecurity Breakthrough Awards aim to recognize the top companies, products, technical innovation, and people that break through the crowded cybersecurity industry.

Leonardo UK selects Rizikon from Crossword Cybersecurity to assist with assessment of supply chain cyber risks

Crossword Cybersecurity Plc is pleased to announce that the UK arm of international defence and security company, Leonardo, has selected Rizikon, Crossword's supplier assurance and third party risk management platform, to assist in their assessment of cyber risk in their supply chain.

Modern SOCs and MDR Services Series: 6 Benefits and Why They Matter

The growing number and complexity of threats, combined with the expansion of the attack surface, complicate the primary purpose of a SOC: detecting, analyzing, and responding to security incidents. These factors generate exponential growth in data volume and security alerts, which teams need more resources to address.

Best Practices, Challenges and Trends in Employee Onboarding for BPOs

Employee Onboarding effectiveness defines whether your employee will be engaged or disengaged at work, depending on the impression created on them. Poorly managed onboarding can lead to abandonment, especially for youngsters. According to an SHRM article: India’s emergence as a global outsourcing hub sheds light on the contribution of the BPO industry in terms of development and innovation.

Staying protected from cybercriminals this holiday season

As we approach the holiday season, we wanted to focus this month’s post on you (and your family). Bad guys don’t just wait until the holidays to start causing havoc, they also relentlessly target all of us all throughout the year. Judging by our perseverance, nothing is going to keep us from a good holiday deal, and attackers love to use this season to their advantage. Therefore, we must all keep a frosty demeanor (pun intended) to protect ourselves.