Information Security

4 tips to improve remote workforce cybersecurity

The surge in cybersecurity threats stemming from remote work is undeniably substantial. Gitnux reports that a significant 66% majority of organizations acknowledge that remote work has amplified these risks. Furthermore, 90% of data breaches are attributed to human errors, while 60% of remote workers admit to using unsecured devices for their work-related tasks. These statistics […]

4 tips to improve remote workforce cybersecurity Read More »

Replaying security: From manual test requests to test scripts

Kalles Group Pen Tester Stan Steenhuis, describes how the investment in constructing custom test requests can be turned into repeatable scripted tests. By adding this process into your pen testing methodology, you can easily develop your existing custom test collection and empower other pen testers on your team to perform these tests. Discovering a significant

Replaying security: From manual test requests to test scripts Read More »

How to mitigate IoT risks using Zero Trust concept

  Sean Rosenberger wrote this article in 2017. The title was, “InfoSec and the Great IoT gold rush”. Ever since we have seen the Internet of Things revolutionize how we interact with technology and connect everyday devices and systems to the Internet. All in a bid to make our lives more convenient and efficient. However,

How to mitigate IoT risks using Zero Trust concept Read More »

What everyone needs to know about the Equifax Breach

Author:  Nic Baus Everyone knows how precious your credit rating can be and how much it can swing you getting a loan for a house, car or even a simple retail credit card. There are three major credit reporting agencies that hold this control, Equifax, TransUnion and Experian. They have everyone’s personal information ranging from

What everyone needs to know about the Equifax Breach Read More »

Applying Artificial Intelligence in cybersecurity

The importance of cybersecurity is growing in tandem with technological progress. In the face of an ever-evolving landscape of cyber threats, organizations and individuals are seeking advanced solutions to safeguard their digital assets. According to the FBI Internet Crime Report for 2022, the FBI’s Internet Crime Complaint Center (IC3) received a staggering 800,944  complaints related

Applying Artificial Intelligence in cybersecurity Read More »

Five security mistakes and how to prevent them

Sometimes it’s just a matter of changing your password more often. Security breaches have become distressingly common in recent years, compromising everything from employment records (security specialist RSA in 2011) to payment card information (Home Depot in 2014). And they’re becoming more complex and lethal, according to the recently released 2017 Verizon Data Breach Digest.

Five security mistakes and how to prevent them Read More »

Oracle HRMS and automation of identity provisioning

In most organizations, a primary responsibility of the Identity and Access Management group is to provision new users in Active Directory and Exchange, modify existing users, and terminate users in (almost) real-time when employees leave the organization. What is a Human Resource Management System? Human Resources departments in modern enterprises commonly leverage Human Resource Management

Oracle HRMS and automation of identity provisioning Read More »

Minority report: Pre-crime technology has arrived

Remember the movie Minority Report, where advanced analytics and supercomputing was able to predict where the next crime would take place and a special police unit was able to arrest murderers before they committed their crime? Well, that technology is not just for Hollywood anymore. Pre-crime technologies are already here The following pre-crime technologies already

Minority report: Pre-crime technology has arrived Read More »

AI-powered application security testing: Get the buzz on the fuzz

It can help developers create quality software and uncover bugs that other tools cannot.  Over 1,000 companies have signed up to preview it.  It’s called Project Springfield and is creating quite a buzz on fuzz testing.  Read on to get the scoop. What it is First of all, fuzz testing, or fuzzing, is essentially a

AI-powered application security testing: Get the buzz on the fuzz Read More »

Discover the intersection of artificial intelligence and cyber security. Explore risks, opportunities, and strategies for safeguarding your organization.

Can artificial intelligence win the war in cyberspace?

Ensuring that artificial intelligence (AI) is ‘secure by design’ and established on solid foundations poses a significant challenge in the cybersecurity space. As AI becomes increasingly pervasive across various technological domains and is integrated into critical systems, the imperative of ensuring secure design and deployment becomes paramount. Neglecting this aspect can potentially expose individuals and

Can artificial intelligence win the war in cyberspace? Read More »

Your future is secured when your business can use, maintain, and improve its technology

Request a free consultation