-
Cabinet Office Reports 800 Missing Electronic Devices in Three Years
PRIVACY PRIVACY The figures have raised concerns about sensitive government data falling into hands of nefarious actors Read More
-
How DNS filtering can help protect your business from Cybersecurity threats
PRIVACY PRIVACY This blog was written by an independent guest blogger. The Domain Name System (DNS) is an important tool that connects devices and services together across the Internet. Managing your DNS is essential to your IT cybersecurity infrastructure. When poorly managed, DNS can become a huge landscape for attackers. Nonetheless, when properly configured, DNS…
-
US Car Giant General Motors Hit by Cyber-Attack Exposing Car Owners’ Personal Info
PRIVACY PRIVACY The stuffing attack exposed customer information and allowed hackers to redeem rewards points Read More
-
ICO Fines Clearview AI £7.5m for Collecting UK Citizens’ Data
PRIVACY PRIVACY Clearview AI has also ordered to delete existing data of UK residents from its systems Read More
-
7 machine identity management best practices
PRIVACY PRIVACY Machine identities are a large, and fast-growing part of the enterprise attack surface. The number of machines—servers, devices, and services—is growing rapidly and efforts to secure them often fall short. Cybercriminals and other threat actors have been quick to take advantage. Cyberattacks that involved the misuse of machine identities increased by 1,600% over…
-
How To Make Your SOC Identity-Aware and Efficient
PRIVACY PRIVACY While an attacker only needs to be right once, security teams must be right every time. That’s why SOC teams must stop ransomware attackers from exploiting AD weaknesses. Operating in shifts around the clock, Security Operations Center teams strive to prevent, detect and respond to cybersecurity threats and incidents. But in an evolving…
-
Mark Zuckerberg Sued Over Cambridge Analytica Data Breach
PRIVACY PRIVACY An investigation found Zuckerberg had lax oversight of users and created misleading privacy agreements Read More
-
UK’s Most Innovative Cyber SME 2022 Finalists Announced
PRIVACY PRIVACY DCMS announce 14 finalists of the UK’s Most Innovative Cyber SME Competition Read More
-
A Practical Approach for Shifting Left
PRIVACY PRIVACY A practical approach to understanding shift left security and how shifting security left can help teams achieve DevSecOps success. As a critical part of DevSecOps, shifting left has become a key aspect of the modern software development process. Traditionally, security was applied at the end of the software development lifecycle (the right side)…
-
Forging Australian Driver’s Licenses
PRIVACY PRIVACY The New South Wales digital driver’s license has multiple implementation flaws that allow for easy forgeries. This file is encrypted using AES-256-CBC encryption combined with Base64 encoding. A 4-digit application PIN (which gets set during the initial onboarding when a user first instals the application) is the encryption password used to protect or…