Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 VaccinesRecently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19... BLOG Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning... VMware Warns of Critical Remote Code Execution Vulnerability In vSphere HTML5 Client March 17, 2021 Recently, a software company named VMware has revealed a critical bug in its vCenter server plugin. It is a part... The Role Of Disciplinary Process In Employee Conformance With Policies February 3, 2021 Disciplinary process is one of those activities that you will often find the managers running away from. In a workplace... Segregation Of Duties: Common Approaches, Issues, And Implementation January 27, 2021 For modern-day businesses, segregation of duties (SoD) is a primary requirement to demonstrate compliance with various laws, regulations, and standards.... What Are the Steps Towards Implementing the Zero Trust Model? January 21, 2021 Zero Trust Model is a security concept that is massively different from conventional network security. In simple words, it acknowledges... What Are The Most Common Myths About ISO 27001? November 27, 2020 ISO 27001:2013 is a class apart when it comes to well-known regulations or standards related to information security. Companies are... Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to... DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the... The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the... Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like... Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to...
Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 VaccinesRecently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19...
BLOG Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning... VMware Warns of Critical Remote Code Execution Vulnerability In vSphere HTML5 Client March 17, 2021 Recently, a software company named VMware has revealed a critical bug in its vCenter server plugin. It is a part... The Role Of Disciplinary Process In Employee Conformance With Policies February 3, 2021 Disciplinary process is one of those activities that you will often find the managers running away from. In a workplace... Segregation Of Duties: Common Approaches, Issues, And Implementation January 27, 2021 For modern-day businesses, segregation of duties (SoD) is a primary requirement to demonstrate compliance with various laws, regulations, and standards.... What Are the Steps Towards Implementing the Zero Trust Model? January 21, 2021 Zero Trust Model is a security concept that is massively different from conventional network security. In simple words, it acknowledges... What Are The Most Common Myths About ISO 27001? November 27, 2020 ISO 27001:2013 is a class apart when it comes to well-known regulations or standards related to information security. Companies are... Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to... DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the... The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the... Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like... Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to...
Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning...
VMware Warns of Critical Remote Code Execution Vulnerability In vSphere HTML5 Client March 17, 2021 Recently, a software company named VMware has revealed a critical bug in its vCenter server plugin. It is a part...
The Role Of Disciplinary Process In Employee Conformance With Policies February 3, 2021 Disciplinary process is one of those activities that you will often find the managers running away from. In a workplace...
Segregation Of Duties: Common Approaches, Issues, And Implementation January 27, 2021 For modern-day businesses, segregation of duties (SoD) is a primary requirement to demonstrate compliance with various laws, regulations, and standards....
What Are the Steps Towards Implementing the Zero Trust Model? January 21, 2021 Zero Trust Model is a security concept that is massively different from conventional network security. In simple words, it acknowledges...
What Are The Most Common Myths About ISO 27001? November 27, 2020 ISO 27001:2013 is a class apart when it comes to well-known regulations or standards related to information security. Companies are...
Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many...
€2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to...
DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers” August 5, 2020 Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn...
A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods....
The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the...
The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the...
Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like...
Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to...