How Scytale Can Help You Comply with the POPI Act: Explained

How to Achieve POPIA Compliance: Complete Checklist

| | All, Blog, General Compliance
Get the essential checklist for POPIA compliance. Learn key requirements and steps to meet South Africa's data protection law. The post How to Achieve POPIA Compliance: Complete Checklist appeared first on Scytale ... Read More
How Scytale Can Help You Comply with the POPI Act: Explained

South Africa’s POPIA Compliance: Everything You Need to Know

| | All, Blog, General Compliance
Learn the essentials of South Africa's POPIA, its impact on data protection, and how it compares to global privacy laws. The post South Africa’s POPIA Compliance: Everything You Need to Know appeared first on Scytale ... Read More
Achieve GDPR Compliance with Scytale

Does the GDPR Really Say That? Clearing Up Common Misunderstandings

| | Tech Talk
Despite extensive information available about the GDPR, many misconceptions still persist. This blog breaks down some of them.  The post Does the GDPR Really Say That? Clearing Up Common Misunderstandings appeared first on Scytale ... Read More
Volt Typhoon Threat Report

Volt Typhoon Threat Report

| | Threat Research
Threat Overview On March 19, 2024, CISA, along with other participating agencies, released a joint Fact Sheet warning executive leaders in the critical infrastructure sector that Volt Typhoon has strategically pre-positioned itself to conduct cyber attacks against US infrastructure. In the event of escalating tension between the US and China, ... Read More
Back to School Reminder - Keep Your Mac Clean!

Back to School Reminder – Keep Your Mac Clean!

| | Threat Research
Key points from our research: Around early-mid August, we noticed an increase in MacOS malware detections, specifically AdLoad and UpdateAgent in IronDome, in the education sector. This timing correlates with students returning to school, therefore bringing their personal (infected) devices to school networks, and is likely the cause of this ... Read More
Back To School Reminder - Keep Your Mac Clean!

Back To School Reminder – Keep Your Mac Clean!

| | Threat Research
Key points from our research: Around early-mid August, we noticed an increase in MacOS malware detections, specifically AdLoad and UpdateAgent in IronDome, in the education sector. This timing correlates with students returning to school, therefore bringing their personal (infected) devices to school networks, and is likely the cause of this ... Read More

Key Findings from Defending the NOC at Black Hat Europe 2022

| | Cybersecurity
Key Points IronNet’s detections during the Black Hat Europe conference revealed not only several active malware infections – such as the Arechclient2 info-stealer – but also exposed a series of poor security practices by attendees that could have led to severe follow-on compromises in both the Black Hat network and ... Read More

The security risk of M&A: Are Chinese cyber threats lurking in legacy infrastructure?

| | Threat Research
Key points In late August 2022, IronNet Threat Research discovered a malicious cyber intrusion by a highly sophisticated, likely China-based threat actor in the network of a U.S. software company. It is suspected the threat actor was conducting staging activity, possibly to exploit the lower security posture over the upcoming ... Read More
The complexities of serverless security

The complexities of serverless security | How to secure serverless applications | Contrast Security

| | serverless
Serverless computing is a cloud-native model that allows developers to write code and deploy applications without needing to manage servers and other infrastructure running the services. Though you’re technically still working with servers, there’s also a cloud provider managing and provisioning the infrastructure on your behalf.  ... Read More
Loading...

Application Security Check Up