Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Attack Misuses Google Docs Comments to Spew Out "Massive Wave" of Malicious Links

Security researchers say they have seen a “massive wave” of malicious hackers exploiting the comment feature in Google Docs to spread malicious content into the inboxes of unsuspecting targeted users. According to a blog post published by Avanan, the comments functionality of Google Docs, as well as its fellow Google Workplace web-based applications Google Sheets and Google Slides, is being exploited to send out malicious links.

Interview with CTO Kathleen Moriarty

For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Kathleen Moriarty, Chief Technology Officer at the Center for Internet Security. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honour of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018.

Six Pillars of DevSecOps

DevOps and Security. One encourages speed, agility, iterative learning, enabling technology to keep up with the pace of business. The other wants to keep you safe, slows things down, crosses all the T's and dots all the I's. They seem to be at odds with one another — but do they need to be? DevSecOps says no, that’s not the way it has to be.

Tooling Overview for API Testing (SAST, DAST, IAST, Fuzzing)

Application Programming Interface (APIs), allow services to communicate with each other. Naturally, applications that are interconnected through many APIs, require thorough security testing, as each connection could potentially include software vulnerabilities. Since there are different methods to test these junctions, I want to briefly discuss the benefits and weaknesses of the most commonly used API testing methods in this article.

NeoSystems Names Susan Mitchell as CFO and Brad Wolf as Senior Vice President of IT Operations

TYSONS CORNER, Va., January 7, 2022 – NeoSystems, a full service strategic outsourcer, IT systems integrator and managed services provider to the government contractor market, has named Susan Mitchell as Chief Financial Officer and Brad Wolf as Senior Vice President of IT Operations.

Minimize Email Phishing Scams with SafeAeon Email Security-as-a-Service

Do you know, email phishing scams are the most common cause of ransomware attacks? Phishing scams – or email fraud are as old as the email itself. The scams are all attempts to get you to volunteer your personal information to criminals or install malware on your computer or mobile device.

CloudCasa Introduces bring-your-own storage and more application support for Kubernetes backup-as-a-service

Join us on this webinar if you are looking for an award-winning Kubernetes backup service that is powerful, easy to use, and free to start using. With CloudCasa, DevOps and IT teams can now be confident that their Kubernetes clusters and application data are protected and tamper proof. At the same time, they can be sure that they are only paying for the data they are protecting or simply start with the Free Plan with 100GB included. This webinar covers new features of CloudCasa and the key benefits that CloudCasa provides for any Kubernetes environment.

Endangered data in online transactions and how to safeguard company information

This blog was written by an independent guest blogger. Online transactions are essential for every modern business. From online shopping to banking, transferring funds, and sending invoices, online transactions ensure utter convenience and efficiency. However, the familiarity of making financial transactions online can make people forget about security and all the dangers that they may be facing. On top of that, new cybersecurity threats keep popping up constantly.

Proactive Cybersecurity: How to Stay Ahead of Today's Threats

For many organizations, cybersecurity is an overwhelming challenge. New threats emerge seemingly in the blink of an eye, and IT and security teams are constantly reacting to the moves of bad actors who always remain one or two steps ahead and get to dictate where and when their attacks are carried out. As you might expect, a reactionary approach to cybersecurity is not ideal. It’s typically borne of necessity due to undermanned teams or inadequate resources. Ultimately, it is destined to fail.