SAP Security Monitoring and Why Is It Important Security is a key element required by any enterprise technology for ensuring business success and growth as well as trust in their buyers. But where to start in setting up a security posture in your SAP environment?… Read More »SAP Security Monitoring and Why Is It Important
Information Security Category
What is an SQL Injection (SQLi)? SQL injection (SQLi) is one of the most common code-injection techniques used to get information from one’s database. Generally speaking, this is malicious code placing in one’s database via a page input, most often a registration form. SQL injection… Read More »SQL Injections: Is There a Way for Real-Time Tracking and Prevention?
Kaseya Ransomware: How It Happened? A cybercrime organization with Russian origins called REvil claims to have infected 1 million systems across 17 countries. It is now demanding $ 70 million in bitcoins in exchange for a “universal decryptor” that will return users’ access. Hackers targeted… Read More »Kaseya Ransomware Attack: How It Affects MSSPs and SMEs, and What to Do to Prevent It
What is XDR and what’s the difference with SIEM? XDR (Extended Detection and Response) is a new trend by large security vendors, and too often people find themselves asking “okay, what’s the difference with SIEM?”. According to Gartner, the main difference is that it is… Read More »SIEM and XDR: The Same Thing Under The Hood
A few days ago, on February 23, the US Senate Intelligence Committee held a hearing with executives from SolarWinds, FireEye, CrowdStrike and Microsoft about the SolarWinds hack. It’s worth listening in full, but we want to focus on one particular aspect described by the participants… Read More »The SolarWinds Hack: What Went Wrong With Missing Alarms and How To Fix It
TeamViewer is a great utility for remotely helping your relatives or for IT people servicing small businesses. But using it in large organizations, and especially for critical infrastructure, is rather risky, as shown in a recent attempt to poison the water of a city in… Read More »TeamViewer Security Risks And How To Mitigate Them
Security breaches are becoming increasingly commonplace and dangerous. The World Economic Forum nominated cyber-attacks as one of the major threats to global stability for 2019. Not only money is at stake, as breaches have an appalling effect on organizations’ reputation, trustworthiness, and often prove to… Read More »The 2020 Must-Know Security Breach Statistics
As the end of the year approaches, some important business decisions need to be taken – strategies must be mapped out, budgets are to be requested, decided, and allocated. This is why we have decided to organize a webinar on the 29th of October at… Read More »Free Webinar: What to add to your cybersecurity roadmap for 2021?
Software-as-a-service is the norm now. All organizations, even the most conservative ones, are using some form of SaaS – be it for storage, email, customer management, marketing, or even low-code. But security is always a concern with SaaS, so vendors need to take extra care… Read More »Five Mandatory Security Features for SaaS
Crunchbase announced that Epic Games have implemented a 2FA in a very innovative way – Fortnite players can unlock a new emote by enabling two-factor authentication. Raising information security awareness across the youngest Internet audience is a challenging journey and it seems that Epic Games… Read More »Epic Games Turning on 2FA – The Rise of The InfoSec Awareness