Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

How Penetration Testing Helps You Comply with ISO 27001?

ISO27001 is a prominent International Standard and best practice for Information Security Management. The core element of this standard is identifying risks and mitigating vulnerabilities that threaten the security of information assets. So, the technical risk and vulnerability assessment form the basis of implementing the ISO27001 Standard.

Zero Trust isn't a Buzzword

Lookout has announced its latest milestone — the expansion of Lookout Continuous Conditional Access (CCA) by integrating security and access platforms. This enables organizations to make detailed and ongoing risk assessments of endpoints and users, and apply that information to very granular access controls (as opposed to a simple yes-no access decision) that ensures business continues securely. This video illustrates how integrating Mobile Endpoint Security, Cloud Access Security Broker (CASB), and Zero Trust Network Access (ZTNA) solutions deliver a modern Zero Trust architecture.

The Great Cybersecurity Talent Migration has Begun, Here's What you Can Do

The macro-economic consequences of COVID-19 have reached cybersecurity and the talented people who keep us secure. In some sense, invisibility is a hallmark of good cybersecurity, back-end operations running smoothly and keeping the assets, operations and reputation of an organization from harm. But this invisibility is built on proper resourcing, and in the last 18 months, we’ve seen a progressive erosion of the human resources behind successful organizational cybersecurity.

How Cloud SOAR helps teams boost security during cloud migration

Cloud computing is exploding, and with the shift to the cloud accelerated by the COVID-19 crisis, more and more companies are bidding farewell to their on-premises solutions and welcoming the new age of the cloud. Read on to find out how Sumo Logic Cloud SOAR can help your organization strengthen its security posture amid a globally accelerated cloud adoption.

What is the CCPA? Definition and Compliance Guidelines for 2021

The California Consumer Privacy Act of 2018 (CCPA) gives Californian consumers greater transparency into how their personal data is being handled. Under the CCPA, California residents have a right to: California's landmark move to greater privacy laws mirrors the consumer data protection posture outlined in the GDPR and Canada's propositions in Bill C-11. Guidance for complying with the CCPA is outlined through CCPA regulations.

Cybersecurity Insights - Malware Evasion Techniques

The majority of malware that the WatchGuard Threat Lab analyzes each quarter is called “zero day malware,” meaning it successfully evaded signature-based anti-malware services. Modern tools and techniques continue to make evasive threats easier to carry out and more effective for adversaries of all skill levels. In this Cybersecurity Insights, learn how threat actors mask their attack payloads from detection and what you can do to defend your organization and customers from these evasive threats.

Don't Let Code Injections Mess Up Your Holiday eCommerce Season

The holidays are right around the corner. It’s a well-deserved time to spend with your friends and family, and it likely translates to increased online sales. But more eCommerce activity also means increased cybersecurity risks. Most organizations with eCommerce deploy cybersecurity measures such as Content Security Policies (CPSs), to help secure their site and protect their customer’s personally identifiable information from a breach.

Achieving Zero Trust? One Size Does Not Fit All

More than a year of near-universal remote work has proven that many of us can reliably stay productive from anywhere — whether it be from home, co-working spaces or otherwise. Businesses have caught wind of this, and according to IDC, 60% of them will continue with remote work or implement a hybrid model even after they reopen their offices again. This calls for a paradigm shift in the way we conduct cybersecurity.