Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

CloudCasa: Kubernetes Backup and Data Migration with Azure Integration and Self-Service Backups

Join us on this webinar to learn about new CloudCasa features that were demonstrated at KubeCon + CloudNativeCon Europe 2022, including: Native integration with Azure Kubernetes Service (AKS) in addition to Amazon Elastic Kubernetes Service. AKS users can automatically discover their clusters, centralize backup policy management across regions and accounts, and dramatically reduce the time to recover clusters and data.

Netwrix: PAM 2.0: Smarter, Better, Faster, Stronger

Theft of privileged credentials is the costliest type of insider threat, and the number of such thefts has tripled over the last two years. Privileged accounts are the most lucrative target for any malicious actor because they provide quick access to critical data and systems - and most organisations have lots of these accounts, which are used by humans and applications. For privileged account management (PAM), most organisations focus on session management and password vaulting, and miss key areas like privilege discovery and the detection and investigation of suspicious admin behavior.

Digicel Deploys Enea AdaptiveMobile Security to Protect Mobile Networks in 26 Caribbean and Central American Markets

Enea the world leader in mobile network security, today announced that Digicel Group has deployed Enea AdaptiveMobile Security's comprehensive signaling security solution to protect mobile networks and subscribers in 26 markets across the Caribbean and Central American region.
Featured Post

How Tech Innovation is Revolutionising Cybersecurity for Law Firms

It is often said that the human factor is the most important part of cybersecurity. In many ways this is true. Cybersecurity tech plays a vital role in everything from blocking dangerous traffic and spotting suspicious activity on an account, to offering the kind of 24/7 surveillance that simply isn't practical (or possible) for humans to carry out themselves. But ultimately, this is only a part of cybersecurity.

Performance improvements, snappier ports, and spring cleaning

The vulnerabilities page allows you to see all findings across your attack surface. This includes simple filters that let you specify what you want to focus on, including the level of severity, which domains you want to look at, and whether it was found in the past week or the past month.

What is the HIPAA Security Rule?

Title II of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) has two key provisions: the Privacy Rule and the HIPAA Security Rule. The Privacy Rule establishes standards for protecting certain health information, or PHI. The Privacy Rule requires those organizations that are governed by HIPAA (covered entities) to implement safeguards to protect the privacy of PHI, and gives individuals the right to access and share their health records.

How DNS filtering can help protect your business from Cybersecurity threats

The Domain Name System (DNS) is an important tool that connects devices and services together across the Internet. Managing your DNS is essential to your IT cybersecurity infrastructure. When poorly managed, DNS can become a huge landscape for attackers. Nonetheless, when properly configured, DNS is a key line of defense against cyber threats for your organization. DNS filtering is an essential component of business cybersecurity.

Securing Your MongoDB Database

Securing databases is a significant aspect of an organization’s infrastructure and security practices. This article explores the methodologies and steps for securing MongoDB Database, a popular non-relational, flexible, and document-oriented database. Before starting, you should understand the difference between self-hosted MongoDB and MongoDB Atlas.

Cyberattacks Targeting NFT Marketplaces and Cryptographic Aficionados

Everything technology touches gets a digital makeover and the creative space wouldn’t be the exception. Non-fungible tokens (NFTs) are virtual assets that represent objects influenced by art, music, games, and videos. You can only buy them online, likely with cryptocurrency. NFTs are generally encoded with the same underlying software as many cryptos. In fact, they are part of the Ethereum blockchain, a cryptocurrency, like bitcoin or dogecoin.