Latest Security Opinions
Gaining a complete view of what data is stored in the cloud, who is using it and where it is being accessed can be vital in uncovering the presence of malicious actors.
Keyloggers are designed to track successive keystrokes made on a keyboard and generally operate without the device user being aware.
Do you know how many people have access to your businesses core systems? Chances are it’s more than you think, and the bad news is that every one of them represents a potential entry point for cybercriminals.
Adopting a Zero Trust mindset means organisations are able to ditch the outdated ‘trust but verify’ approach and instead embrace a ‘never trust, always verify’ security stance, and ensures organisations stay ahead of the security curve.
Those doing these early cybersecurity jobs ended up knowing a bit about everything and evolved into generalists. Since then, with so many new avenues of technology, most of these generalists either specialised or went into management. New recruits don’t have time to acquire the historical knowledge of generalists
False positives are a symptom of a problem, not the cause Security ‘alert fatigue’ is a real issue. According to a recent report from the SANS Institute, alert fatigue is one of the biggest barriers to retaining top security talent. Many of the most common security tools, including security incident and event management (SIEM) tools… Read More
Building a resilient defense against ransomware is becoming a ‘must-have’ for any organisation that takes the risks seriously and wants to protect its IT ecosystem from the downtime, disruption, and cost that frequently come with ransomware infections.
However powerful your leadership, however large your organisation, however advanced your systems and however well trained your personnel, the success or failure of your critical systems can be decided in one small “go or no go” moment
Essential guidance for keeping software truly secure A lot has been said about DevSecOps from experts, practitioners, pundits and vendors. However, recommendations that start and finish with securing code leave critical gaps. In order to keep software secure, businesses must go beyond just securing the code they are developing to also secure the pipeline that delivers that… Read More
Collectively we have a responsibility to ensure digital identity technologies are truly inclusive and don’t exclude or misrepresent the underrepresented, writes Cindy White, CMO, Mitek.
No one wants to suffer the consequences of a serious cyber-attack. But the challenge of identifying advanced phishing threats is increasing. Businesses must respond with urgency to avoid being fooled.
In this Q&A, we talk with Jason Soroko from SSL447, a managed cybersecurity services company recently acquired by Sectigo. Soroko explains the importance of Public Key Infrastructure to Digital Identity and its centrality to Zero Trust Architecture.