Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

opsdemon

Latest posts

Meet SmartRisk Agent: Unlock Your New Human Risk Management

Depending on who you ask, between 70 and 90 percent of cyber risk has human error as the root cause. That's why Human Risk Management (HRM) is so important. And here is the next major advance in HRM. We're thrilled to announce the second version of our risk score architecture. It is so far advanced we have renamed—promoted really—our initial "Virtual Risk Officer" to SmartRisk Agent.

"Operation Kaerb" Takes Down Sophisticated Phishing-as-a-Service Platform "iServer"

A partnering of European and Latin American law enforcement agencies took down the group behind the mobile phone credential theft of 483,000 victims. Someone steals a physical mobile phone and they need to unlock it. But to do so, you need the Apple ID or Google account of the phone’s owner. So, where do you go? Well, it used to be iServer – an automated phishing-as-a-service platform that could harvest credentials to unlock the stolen phones.

CTEM step-by-step guide | Stage two: Discovery

Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of implementing a robust CTEM program. Coined by Gartner in 2022, CTEM is a powerful process that can help continuously manage cyber hygiene and risk across your environment. It’s also a lot to think about when you’re starting out, so it helps to break things down.

What is Open XDR

Open XDR is a vendor-agnostic XDR solution that interacts effortlessly with an organization’s existing security infrastructure. It is intended to collect, correlate, and analyze data from many security tools and platforms, resulting in a unified view of the security landscape. Unlike traditional XDR systems, Open XDR allows enterprises to select the finest security products for their individual needs without being restricted to a single vendor’s ecosystem.

Analyzing the Latest APWG Phishing Activity Trends Report: Key Findings and Insights

In the second quarter of 2024, 877,536 phishing attacks were reported, a marked decrease from the 963,994 attacks reported in the first quarter of the same year. However, this might not be a reason to celebrate just yet, as this reduction might be due to the fact that email providers have made it increasingly difficult for users to report phishing attempts.

Advanced Tips for Leveraging the NIST Cybersecurity Framework for Compliance

Depending on the industry, location, and business operations of your organization, you may have any number of cybersecurity regulations to comply with. Keeping track of each law that affects your organization and the various requirements associated with them can be overwhelming, but the consequences of noncompliance are often far worse.

What is India's Digital Personal Data Protection (DPDP) Act? Everything You Need to Know!

Data protection has become a critical concern worldwide as digital transactions and data exchanges grow. Countries are establishing strict data protection laws to safeguard personal information, and India is no exception. The Digital Personal Data Protection (DPDP) Act is India’s response to growing privacy concerns and the need for robust regulations around personal data usage.

How can retailers prevent cybersecurity incidents?

In today’s digital age, cybersecurity is no longer just an IT concern; it’s a critical component of retail success. As more customers shop online and engage with brands through digital platforms, the risks associated with cyber threats continue to grow. Whether you run a brick-and-mortar store, an e-commerce site, or a hybrid model, safeguarding your business from cyber attacks is essential.

Open Source Security for Hardening

OS hardening refers to the process of enhancing the security of an operating system by implementing various measures and practices to minimize vulnerabilities and strengthen its resistance against potential cyber threats and attacks. This involves configuring the OS settings, applying security patches, disabling unnecessary services, and implementing access controls to create a more robust and secure computing environment.