17 articles
Today we tell you about our practices for releasing new products, and also updating existing releases, which reduce the risk of large-scale incidents.
Medium-sized businesses increasingly find themselves on the receiving end of targeted attacks. What tools does one need when basic security proves inadequate?
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
What are the most common MITRE ATT&CK techniques encountered in real-world incidents — and how to neutralize them? We investigate using statistics from Incident Response and MDR services!
To go undetected, attackers can operate in your network without any malware at all. How to detect them and prevent damage?
What’s the principle of least privilege, why’s it needed, and how does it help secure corporate information assets?
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
We take an in-depth look at securing and configuring containerization systems.
What tasks needlessly overload infosec experts, and how to break the curse of overtime.
Offboarded employees often retain access to work information. What are the risks, and how to deal with them?
Legacy systems continue to toil away in embedded solutions, medical equipment, and precision instruments. How can the respective security risks be mitigated?
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
Which corporate assets should be first in line for protection against cyberattacks?