'

Cloud identity security success: 3 critical factors

Cloud identity security success: 3 critical factors

Today, more than ever, security is all about identity. Especially in the cloud, the central management and proliferation of cloud services means that with the proper identity and permissions, one can do almost anything (legitimate or malicious). Product management has been my focus for over 15 years, and in that time, I have experienced multiple … Read more

Identity security’s crucial role in safeguarding data privacy

Identity security’s crucial role in safeguarding data privacy

More than 130 global jurisdictions have enacted data privacy laws. While each contains rules and requirements distinct to their regions, they share a common priority: identity security. That’s because if an attacker compromises a single identity in an organization where sensitive data is collected, stored, and handled, it’s all downhill from there. A single stolen … Read more

2024, the year of elections

2024, the year of elections

2024 is a year of elections, with more than 70 elections scheduled in 40 countries around the world. One of the key pillars of democracy is trust. To that end, ensuring that the Internet is trusted, secure, reliable, and accessible for the public and those working in the election space is critical to any free … Read more

LummaC2 Stealer’s New Anti-Sandbox Technique? Trigonometry

LummaC2 Stealer’s New Anti-Sandbox Technique? Trigonometry

New research by Outpost24 has revealed that malware developers are using sandbox evasion techniques to avoid exposing malicious behaviour inside a sandbox where malware is analysed by security researches. Outpost24’s threat intelligence team, KrakenLabs, discovered that malware developers are using trigonometry to detect human behaviour based on cursor positions to avoid automated security analysis. The Malware-as-a-Service (MaaS) … Read more

Recognising Scam Patterns and Preventing Data Loss: A Unified Approach

Recognising Scam Patterns and Preventing Data Loss: A Unified Approach

Cybersecurity professionals stand on the frontlines, ever-vigilant against an increasing tide of cyber threats. From protecting sensitive corporate data to safeguarding our personal information, the battle against cybercrime is ongoing. In today’s digital era, cybercriminals are becoming more sophisticated and professional in their methods. Hybrid work models and broadly adopted cloud technology create highly dispersed … Read more

Understanding the UK government’s new cybersecurity regime, GovAssure

Understanding the UK government’s new cybersecurity regime, GovAssure

With the ever-growing threat of cyberattacks on the UK government and Critical National Infrastructure cyber safety matters more than ever. With the rising tide of ever-resent threat in mind, GovAssure was launched by the UK government in April 2023. It’s a cyber security programme that aims to ensure government IT systems are fully protected from … Read more

Why the DOD’s Replicator should be a model for cybersecurity

Why the DOD’s Replicator should be a model for cybersecurity

The United States Department of Defense (DOD) recently revealed a new initiative centered on securing the fundamentals of technology innovation viewed as necessary to win a strategic competition with the People’s Republic of China. The new program, called Replicator, aims to take development – particularly those pertaining to areas of artificial intelligence (AI) like robotics, … Read more