Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

2024 Security Landscape: The Surge in Demand for Continuous Security Testing | Razorthorn Security

Get ready for the challenges of 2024 as the demand for security testing reaches unprecedented levels. As the owner of a consultancy, I've witnessed a significant uptick in the need for security assurance, with clients seeking more than just the traditional annual security check. In this video, I share insights into the changing dynamics of security testing and unveil our upcoming continuous penetration testing platform, Razor Edge.

Preventing and mitigating data loss with Graylog

If you’re handling sensitive information, dealing with data loss can be more than just a headache. Log management tools such as Graylog can enhance your incident response and management strategies, and help you mitigate the damage when a breach occurs in your database. Minimizing data loss with a fast and scalable logging solution is key if you want to bring your cybersecurity to the next level.

How to Check If Someone Is Using My Identity

Nowadays, digital transactions and virtual interactions aren’t exactly optional. People can’t keep their information off the web due to professional reasons, and many processes are exponentially more convenient through an online profile. With the influx of data stored on the web, it’s a veritable treasure trove for malicious hackers. Bits and pieces of the personal details we nonchalantly put in online profiles can lead to severe identity theft cases.

Another Insurance Broker Breached; 1.5 Million Consumers Compromised

A Californian insurance brokerage offering insurance and budgetary solutions for schools, community agencies, and healthcare organizations—Keenan & Associates, has announced a significant data breach. The organization provides services to many industries and retains some data on behalf of its clients during its work.

Trusted Domain, Hidden Danger: Deceptive URL Redirections in Email Phishing Attacks

In this ever-evolving landscape of cyberthreats, email has become a prime target for phishing attacks. Cybercriminals continue to adapt and employ more sophisticated methods to effectively deceive users and bypass detection measures. One of the most prevalent tactics nowadays involves exploiting legitimate platforms for redirection through deceptive links.

Step Builder: One Giant Leap for No-Code Capabilities

No-code support should be just that – the ability to build automations without coding. At Torq, we continually work to extend the out-of-the-box no-code automation features available in our platform. That’s just what we’re doing with Step Builder, a new no-code feature that is now in GA. Step Builder gives Torq users the ability to quickly and easily create custom content without the need to code, making your options for integration limitless.

The Power of 11:11 Cloud Backup for Microsoft 365, Now in Australia!

In today’s dynamic IT landscape, safeguarding your data — no matter where it lives — is non-negotiable. Doing so, however, is much easier said than done. Success requires the diligence to look under every rock for vulnerabilities and gaps in retention, even (and especially) in places you wouldn’t expect. Take Microsoft 365, for example. It’s no secret that it has changed productivity in the workplace forever.

The 443 Podcast - Episode 277 - A Blizzard of Threats

This week on the podcast, we cover two "Blizzard" threat actors targeting governments and private organizations. We also give an update to the SEC's compromised Twitter/X Account, and then end with a discussion of an EU program designed to improve their citizen's privacy while browsing the internet. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

The Complete Vulnerability Assessment Checklist

Vulnerability assessments—as part of your company’s vulnerability management strategy—are an essential step. Through a vulnerability assessment, your organization can find critical vulnerabilities and keep your assets safe. But it is not always clear where to start with such assessments. Accordingly, this blogpost provides a comprehensive checklist for performing vulnerability assessments; in addition, it addresses both organizations and security testers.