Advisory: CVE-2023-4863 – Critical WEBP Bug
Background On The Vulnerability:
Date Vulnerability was discovered by Citizen Lab: September 6th/7th
In 2024, the landscape of ransomware attacks will continue to evolve, drawing from past trends while adapting to new defences and technologies.
Learn about seven of the most popular cyber security frameworks being used by businesses around the world.
Date Vulnerability was discovered by Citizen Lab: September 6th/7th
In order to defend your organisation, you need to think like both a protector and an attacker. By seeing things from a hacker's viewpoint, you can better protect your organisation from threats. This blog dives into this mindset, offering simple steps to make your organisation safer.
With many companies struggling with the intricacies of cyber security, introducing an expansive supply chain into the equation can greatly exacerbate the already tough challenges. In this blog we take a look at what supply chain attacks are and some ways to reduce the risks they pose.
In the world of cyber security, the battle between defenders and attackers is continuous, much like a never ending game of chess. As defence mechanisms evolve, attackers adapt, making their strategies ever more sophisticated. With the proliferation of cutting-edge technologies, the sophistication of attack methodologies has also surged. Amidst this, the significance of red teaming and pentesting has become paramount.
Almost every organisation, whether big or small is online in some way, necessitating the need for cyber security. However, cyber security isn't just about protecting your data; it's about adhering to regulations, avoiding crippling fines, and protecting your reputation in the marketplace.
When we speak of cyber security and the world of technology, we're discussing an industry that, at its core, thrives on innovation. But while the spotlight often shines on the latest advancements, it's essential to remember the foundations that paved the way.
Legacy software and hardware, though once the pillars of digital innovation, have become cyber security vulnerabilities today. These old systems, though still in use, become potential "digital time bombs," presenting growing cyber security risks that businesses and individuals must address. By recognising these risks and proactively addressing them, we can ensure that our digital past doesn't compromise our future.
ISO 27001 continues to be the most popular security framework organisations align themselves to but achieving compliance can be a challenge for many organisations. Luckily there is a service that can greatly help meet the standards; Managed Detection and Response (MDR).
Enterprise Times talked with Richard Ford, Chief Technology Officer at Integrity360, about Managed Detection and Response. In the past, tools have been sold based on fear and the need to have multiple overlapping tools to plug gaps. But that has come at a price of complexity which, in itself, leads to gaps and mistakes. Listen to Richard's insights in the podcast below.
Every business today faces a flood of online weaknesses that can be a problem. Spotting these issues, reacting fast, and stopping new ones from popping up is a big task. Vulnerability management helps companies tackle these challenges head-on. In this blog we look at seven of the challenges Vulnerability Management services tackle.
With cyber threats and vulnerabilities constantly changing Vulnerability Management Services are now essential in securing your organisation from cyber threats. In this blog we take a look at what vulnerability management is, the difference between vulnerability, risks, threats, and how vulnerability management services work to benefit your organisation.
Dublin, Ireland
+353 01 293 4027
London, United Kingdom
+44 20 3397 3414
Sofia, Bulgaria
+359 2 491 0110
Stockholm, Sweden
+46 8 514 832 00
Madrid, Spain
+34 910 767 092
Kyiv, Ukraine
+38 0 504 701 125
Naples, Italy
Vilnius, Lithuania
Cape Town, South Africa
+27 21 100 3774