Optimizing A Monitoring System: Three Methods for Effective Incident Management

Optimizing A Monitoring System: Three Methods for Effective Incident Management

Picture this: You’ve just returned from a well-deserved vacation and, upon opening up your security monitoring system you’re faced with the prospect of analyzing thousands of events. This isn’t an imaginary scenario, ...
WordPress Arbitrary File Deletion Vulnerability Plugged With Patch 4.9.7

WordPress Arbitrary File Deletion Vulnerability Plugged With Patch 4.9.7

On Jun 26 an arbitrary file deletion vulnerability in the WordPress core was publicly disclosed, the vulnerability could allow an authenticated attacker to delete any file and in some cases execute arbitrary ...

Cloud Security For The Healthcare Industry: A No-Brainer

The healthcare industry has become one of the likeliest to suffer cyber-attacks, and there’s little wonder why. Having the financial and personal information of scores of patients makes it a very appetizing ...
Indonesian Hacker Group Cashes In On Blockbuster Movie Titles

Indonesian Hacker Group Cashes In On Blockbuster Movie Titles

When breaking the law isn’t a barrier, there’s always a way to make a quick buck. We see it every day, and this time from an Indonesian cybercrime campaign infecting vulnerable websites ...
Monitoring Data & Data Access to Support Ongoing GDPR Compliance – Part III: Tools

Monitoring Data & Data Access to Support Ongoing GDPR Compliance – Part III: Tools

The new European Union (EU)-wide General Data Protection Regulation (GDPR) was signed into law in late April 2016, and the compliance deadline came into effect on May 25, 2018. The Regulation is ...

Facebook, GDPR and the Right to Privacy: Three’s a Crowd?

Back in 2016 the European Union voted to pass the mother of all security laws, aimed at further extending the rights of its citizens to control how their data is used. The ...

The AI’ker’s Guide to the (cybersecurity) Galaxy

As a security veteran, I find myself from time to time having to explain to newbies the importance of adopting a ‘hacker’s way of thinking’, and the difference between hacker’s thinking and ...
Loading...