Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Deploy Office 365 Security Baseline in OctigaOffice 365 Security Best Practices

Office 365 security baselines help achieve a tailored desired state configuration through continuous monitoring & alerting. Octiga's intelligent baseline engine then guides you to implement Office 365 security best practices confidently. As a result, you'll be alerted of and remediate the issues for Office 365 tenants, groups or users within seconds!

Export Office 365 Security Baseline Report in Octiga for Client

Baseline reports for Office 365 tenants are essential to infer trends based on historical data to enhance client security AND provide proof of compliance. Manage client relationships by reporting them rapidly through targeted baseline security reports, tenant-wide or group-wide, generated in a single click!

Investigate Office 365 Security and Compliance Alerts in Octiga

Investigate possible Office 365 security and compliance alerts across all tenants systematically. Identify suspicious logins, external breaches, faulty inbox rules etc., and drill down into details like risk score, severity, country of the breach, connection type, & user ID, user type, to prioritise in-app remediation in clicks.

Cyberint: 2021 Ransomware Recap

Ransomware remains a complex and growing threat to companies. We witnessed over 2,800 ransomware cases in 2021 and, while statistics related to ransomware activity vary, they all indicate an increase in attacks week-after-week. Join our webinar as we will provide a summary of 2021's ransomware attacks, evolving TTPs, and Cyberint Research's predictions for 2022.

Crossword Cybersecurity supports techUK's SME Membership with Cyber Essentials certification and access to Rizikon Assurance

Crossword Cybersecurity Plc is today announcing that its online software assurance platform, Rizikon Assurance, is being made freely available to members of UK technology trade association, techUK for a single-use cyber security assessment to support them towards Cyber Essentials certification.

NFTs - Protecting the investment

This blog was written by an independent guest blogger. Non-fungible tokens (NFTs) are the new player in the financial investment market. They’ve seen tremendous interest from a wide range of parties, whether that be institutional investors or retail hobbyists looking to find an angle. As with anything involving money, malicious actors are already starting to take hold; Insider magazine recently highlighted the 265 Ethereum (roughly $1.1 million) theft due to a fraudulent NFT scheme.

Key Criteria for Choosing Mobile App Security Solution Vendor

Mobile phone apps are more popular than ever with a rapidly expanding user base each year. They have literally made everything come to the fingertips of the users and there’s a significant demand for mobile apps for just about everything, generating great competition and pressure among app developers around the world.

DevSecOps in an Agile Environment

At first glance, DevSecOps and Agile can seem like different things. In reality, the methodologies often complement each other. Let’s see how. Agile is a methodology that aims to give teams flexibility during software development. DevSecOps is about adding automated security to an existing automated software development process. Both are methodologies that require high levels of communication between different stakeholders and continuous improvement as part of the process.

CrowdStrike Powers MXDR by Deloitte, Offering Customers Risk Mitigation with Powerful Customized and Managed Security Services

Deloitte, a leader in managed security services, has launched MXDR by Deloitte — a Managed Extended Detection and Response suite of offerings — within which the CrowdStrike Falcon® platform will power a number of solutions. MXDR by Deloitte combines an integrated, composable and modular managed detection and response SaaS platform with managed security services in a unified offering of advanced, military-grade threat hunting, detection, response and remediation capabilities.