• Compliance: Public trading companies in USA to report cyber incidents to the SEC

    The US Securities and Exchange Commission (SEC) is expected to finalize rules in April 2023 that will require publicly traded [...]

  • Emerging Threats: The PLAY with OWASSRF

    Executive Summary:First appeared in June 2022, still active and victimizing high-profile targets.Second Highest number of victims on the first week [...]

  • A BOLDMOVE by the Chinese Hackers: Exploiting Fortinet Systems

    By Nilaa Maharjan, Security Research.ContentsKey FindingsWhich Products and Versions are Affected?Making a BOLD statementBoldly going where no malware has gone [...]

  • Critical Infrastructure: Securing Police Force Data

    As cybersecurity becomes increasingly vital to the way we manage our computer systems, it's important to look across our social [...]

  • New Year: New Threats, New Vectors, New Actors

    We’ve all heard the phrase “new year, new me,” but in the world of cybersecurity, the new year can only [...]

  • Cyber Insurance: Is this the only type of insurance your data, brand, and reputation needs?

    If you’re running a business in 2023, it’s more important than ever to have a watertight cybersecurity infrastructure in place. [...]

  • Uncovering illegitimate Crypto-Mining Activity (Cryptojacking) in the Enterprise: Utilizing Network Logs for Investigation and Remediation

    By Swachchhanda Shrawan Poudel, Security ResearchContentsCrypto mining fast factsThe current landscape of crypto miningHow cyber-miners gain access to your systemHow [...]

  • SAP: What is the SAP migration for 2027?

    SAP is one of the largest software companies in the world, providing enterprise application software across industries. Based in Germany, [...]

  • What does a CISO need to know about SAP SECURITY?

    by Sükrü ilkel Birakoglu, Senior DirectorSAP Systems had their evolution in years from closed mainframes to client-server-based systems with internet [...]

  • Crypto mining: Understanding and Protecting Against Cryptojacking

    We take it by now you have heard of crypto currency, so we won’t insult you by explain too much [...]

  • Critical Infrastructure: Protecting Health Service Data

    There are few sectors where privacy is as essential as it is in healthcare. People's health and personal information should [...]

  • Ransomware-as-a-Service (RaaS) – A Growing Threat in Cybersecurity

    In the world of cybersecurity, ransomware-as-a-service (RaaS) has become a growing concern for businesses and individuals alike. RaaS is a [...]