Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is the NIST cyber security framework?

The NIST Cybersecurity Framework is a set of guidelines and best practices designed to help organisations better manage and reduce cybersecurity risk. It stands for the National Institute of Standards and Technology Cybersecurity Framework (CSF). The Framework was developed by NIST, part of the U.S. Department of Commerce, and first published in 2014, following an executive order by then President, Barack Obama which focused on improving the cybersecurity of critical infrastructure in the United States.

What is a SOC in cyber security? Definition & Meaning

You may have heard people talking about SOC recently, especially now with the increase in the use of digital assets and remote applications. In these cases, SOC enables organisations to bolster their security posture and be more proactive in detecting and preventing threats. But what is SOC in cyber security?

Apache Superset - Database Data Retrieval Through Improper Error Handling

Anastasios Stasinopoulos from OBRELA LABS Team discovered a security flaw that affects Apache Superset (before 3.0.4, from 3.1.0 before 3.1.1), an open-source modern data exploration and visualization platform. Apache Superset error handling can be manipulated in order to allow data retrieval from the backend database.

Obrela Achieves NCSC CIR Level 2 Assure Service Provider Status , Demonstrating Commitment to Cybersecurity Excellence

Obrela proudly announces it has been awarded the National Cyber Security Centre (NCSC) Cyber Incident Response (CIR) Level 2 Assured Service Provider status issued by CREST. This underscores Obrela's unwavering dedication to maintaining the highest standards of cybersecurity readiness and incident response capabilities.

Cloud Monitoring: Critical for Business Success

Cloud Monitoring is a crucial part of the security stack for many modern enterprises. More businesses have continued to shift their services and operational activity into the cloud in the form of Software (SaaS), Platform (PaaS), and Infrastructure as a Service (IaaS). They have done this for several reasons, including: This is taking place in both small- and large-scale enterprises. Threat actors have responded by targeting cloud services with increased frequency.

Unveiling Our Redesigned Website:

We are thrilled to announce the launch of our new website, a testament to Obrela’s commitment to excellence in the ever-evolving landscape of cybersecurity. As part of this commitment, we have revamped our website to provide you with an enhanced experience, making it easier for you to explore and discover more about our cutting-edge solutions.

Protecting your Enterprise with Penetration Testing

In the arsenal of cyber security tools available to organizations, the penetration test is a key component. Business applications, and organization infrastructure (operating systems, databases, networks, etc.) all have potential vulnerabilities, many of which are just waiting for threat actors to exploit.

Obrela Cybersecurity Predictions 2022

As 2021 draws to a close, it is safe to say the year has been a blockbuster for cybercrime. We have witnessed attacks on critical national infrastructure, which have impacted the supply of consumer commodities. We have seen law enforcement clamp down on cybercriminals, taking down some of the most ruthless operations that have wreaked havoc on organisations and consumers across the globe.

How to Protect From Potential Cyber Threats Stemming From Russian/Ukrainian Crisis

The following organizations should raise their INFOCON levels and be prepared for cyber-attacks because of this conflict: Our threat intelligence teams continue to enhance Obrela’s technology with new threat intel information as soon as it becomes available. We are conducting threat hunting activities to proactively detect and respond to emerging threats.

Can MDR Solve the Cybersecurity Crisis?

Can MDR solve the cybersecurity crisis? The short answer: Every generation has its take on how to do security. And each one thinks it has found the solution in new technology. In the 1990s, the LAN firewall rose to prominence, followed by refinements in the form of unified threat management (UTM) and next-generation firewalls (NGFW) that put even more traffic inspection barriers in the way of malware communication.