How to Achieve POPIA Compliance: Complete Checklist
Get the essential checklist for POPIA compliance. Learn key requirements and steps to meet South Africa's data protection law. The post How to Achieve POPIA Compliance: Complete Checklist appeared first on Scytale ... Read More
South Africa’s POPIA Compliance: Everything You Need to Know
Learn the essentials of South Africa's POPIA, its impact on data protection, and how it compares to global privacy laws. The post South Africa’s POPIA Compliance: Everything You Need to Know appeared first on Scytale ... Read More
Does the GDPR Really Say That? Clearing Up Common Misunderstandings
Despite extensive information available about the GDPR, many misconceptions still persist. This blog breaks down some of them. The post Does the GDPR Really Say That? Clearing Up Common Misunderstandings appeared first on Scytale ... Read More
Volt Typhoon Threat Report
Threat Overview On March 19, 2024, CISA, along with other participating agencies, released a joint Fact Sheet warning executive leaders in the critical infrastructure sector that Volt Typhoon has strategically pre-positioned itself to conduct cyber attacks against US infrastructure. In the event of escalating tension between the US and China, ... Read More
Back to School Reminder – Keep Your Mac Clean!
Key points from our research: Around early-mid August, we noticed an increase in MacOS malware detections, specifically AdLoad and UpdateAgent in IronDome, in the education sector. This timing correlates with students returning to school, therefore bringing their personal (infected) devices to school networks, and is likely the cause of this ... Read More
Back To School Reminder – Keep Your Mac Clean!
Key points from our research: Around early-mid August, we noticed an increase in MacOS malware detections, specifically AdLoad and UpdateAgent in IronDome, in the education sector. This timing correlates with students returning to school, therefore bringing their personal (infected) devices to school networks, and is likely the cause of this ... Read More
Key Findings from Defending the NOC at Black Hat Europe 2022
Key Points IronNet’s detections during the Black Hat Europe conference revealed not only several active malware infections – such as the Arechclient2 info-stealer – but also exposed a series of poor security practices by attendees that could have led to severe follow-on compromises in both the Black Hat network and ... Read More
AppSec and the ‘Ugly-Baby’ syndrome | Application Development Security Solutions | Contrast Security
As a developer, have you ever been told your baby is ugly? ... Read More
The security risk of M&A: Are Chinese cyber threats lurking in legacy infrastructure?
Key points In late August 2022, IronNet Threat Research discovered a malicious cyber intrusion by a highly sophisticated, likely China-based threat actor in the network of a U.S. software company. It is suspected the threat actor was conducting staging activity, possibly to exploit the lower security posture over the upcoming ... Read More
The complexities of serverless security | How to secure serverless applications | Contrast Security
Serverless computing is a cloud-native model that allows developers to write code and deploy applications without needing to manage servers and other infrastructure running the services. Though you’re technically still working with servers, there’s also a cloud provider managing and provisioning the infrastructure on your behalf. ... Read More