Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Log Management for CMMC

The Cybersecurity Maturity Model Certification (CMMC) seeks to help secure the Defense Industrial Base (DIB) supply chain by requiring contractors and subcontractors to standardize their security controls. With CMMC 2.0, the Office of the Under Secretary of the Defense Acquisition and Sustainment (OUSD(A&S)) designated National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 as the foundation of the framework.

What Is an Identity Breach? Recognizing Early Signs & Types

An identity breach is an identity-based impersonation attack in which a hacker exploits vulnerabilities to obtain PII (personally identifiable information), contact information, credit card numbers, and important credentials like passwords and usernames to commit identity theft, identity fraud, or other cybercrimes without the victim’s knowledge. Using stolen information from a data breach, cybercriminals may attempt to steal classified information or money from the victim.

It's Time for Business Continuity and Disaster Recovery Teams to Redefine Trust

In workplaces of the past, IT teams could afford to trust the devices in their network because they knew them. After all, they issued and managed them. But today’s work environment makes trust a little difficult. From work from home to the vast expansion of enterprise applications, IT and security teams have a whole new set of cybersecurity challenges to mitigate. Your workers are human and are subject to human error. Phishing attempts are not always easy to spot.

Budget and momentum are key to cybersecurity automation maturity - and CISOs are feeling left behind

As cyber threats intensify and the human and financial resources available to deal with them remain limited, there is a growing need for automation in cybersecurity. The intelligent automation of key cybersecurity processes can significantly improve an organization’s posture and at the same time support under-pressure employees by reducing reliance on manual processes.

IoT Device Lifecycle Management: A Comprehensive Guide for IT Managers

IoT device lifecycle management is the process of managing the entire life cycle of an IoT device, from conception and design to manufacturing and distribution, to installation and eventual decommissioning. The goal of IoT device lifecycle management is to ensure that devices are properly managed throughout their lifespan to maximise their operational efficiency and longevity.

GitGuardian Internal Monitoring demo - Secrets detection in source code repositories

GitGuardian's internal monitoring solution helps unite Dev. Sec. and Ops to fight hardcoded secrets. In this short demo, we show exactly how GitGuardian can help identify secrets inside your source, quickly and effectively remediate incidents and prevent secrets from being committed into source code repositories.

What's Hiding in your Attack Surface?

Informer’s Founder and CEO Marios Kyriacou will be speaking at the UKsec Cyber Security Summit. UKsec takes place at the Millennium Gloucester in London on the 22nd and 23rd of November. The 2-day conference sees exclusive keynotes from trail-blazing industry execs as well as attendees having the chance to take part in interactive panel debates, benchmarking their approach to cyber security against peers.

ManageEngine: Comply with HIPAA and safeguard the privacy of patients

HIPAA compliance is more important than ever in a healthcare industry that is increasingly reliant on technology to carry out day-to-day functions, such as maintaining electronic health records, generating test reports, and enabling online doctor-patient communications. Attackers know that a single patient's health care record can fetch up to a thousand dollars on the black market. To safeguard patient privacy, avoid unnecessary penalties, and comply with HIPAA, healthcare organizations must have full control and visibility over sensitive data.