Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

SANS 2020 MITRE ATT&CK

The Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) project by MITRE is an initiative started in 2015 with the goal of providing a "globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. Since its inception, ATT&CK has taken the information security industry by storm. Many vendors and information security teams the world over have moved to adopt it with blinding speed-and for good reason: It is one of the most exciting, useful and needed efforts within InfoSec in recent memory.

Five Steps to a Modern Cyber Risk Management Team

A company-wide cybersecurity strategy is absolutely essential to combat today's evolving risk landscape. This means breaking down silos and encouraging the engagement of security experts throughout different business units. By leveraging collective understanding to expose unknown threats, you can amplify the effectiveness of your security program and technology stack. We call this "Modern Cyber Risk Management".

Data Loss vs. Data Leaks: What's the Difference?

Data loss refers to the unwanted removal of sensitive information either due to an information system error, or theft by cybercriminals. Data leaks are unauthorized exposures of sensitive information through vulnerabilities on the digital landscape. Data leaks are more complex to detect and remediate, they usually occur at the interface of critical systems, both internally and throughout the vendor network.

Top 3 NLP Use Cases for ITSM

What is NLP Natural Language Processing is a specialized subdomain of Machine Learning which is generally concerned with the interactions between the human and machine using a human verbal or written language. NLP helps in processing huge volumes of text which would take a significant amount of time for a human to comprehend and process otherwise. Hence a lot of organizations take advantage of NLP to gain useful insights out of their text and free formatted data.

How can eCommerce portals make shopping secure?

ECommerce security protects your company and customer data from cyber-attacks and malicious bots. As an eCommerce business owner, you must ensure that all data is handled securely to avoid a breach. Poor eCommerce security can have many negative impacts on a business. Customer trust relies on great customer experience, and when customers enter their personal details into your website, they expect it to be protected.

Largest Iran's Bank Allegedly Breached Exposing 47M Records Of The Customer

Recently, while performing a deep inspection of the dark web through Foresiet DigiRisk Platform, our Cyber Research and Support Team (FCRST) noticed, 33M records of Iran Bank were found breached and available. Our researcher has validated the data and it's very scary and has complete information including Account detail, card detail, PII information.