Recent cyber breaches and tighter compliance regulations are pushing businesses to invest more heavily in IT security. You and your organization may very well be in the process of assessing your...

Uber’s latest data breach drives home GDPR lessons
After a relatively quick rise, the entire Uber empire is at risk of falling apart. Uber has already been spending a lot of resources on public relations, legal challenges, as well as marketing exercises to sustain growth in the European Union...

Self-signed certificates: Wolves in sheeps’ clothing
Things often turn out great when you do them yourself. But when it comes to signing SSL certificates, you might want to give that DIY project a second thought. Before...

Taking stock of your security posture after the Equifax cyber breach
Equifax, a leading credit bureau, was victim to a massive cyber breach a few months ago. Given that the attack was one of the largest...

Begin your GDPR journey with privileged access management
The core of the GDPR is all about data protection; specifically, securing EU citizens’ personal data. However, the GDPR does not explicitly state how to achieve this level...

Getting to know the GDPR: The technical and organizational measures
Before we jump into the third part of this GDPR blog series, let’s take a moment to think about a few questions. Such as, why are compliance mandates necessary? Are they framed to just prevent data breaches? Are...
Log management and SIEM fundamentals: Searching through logs and responding to incidents
Understanding what happened in a security incident and trying to analyze the root cause of an attack is like looking for a needle in a haystack....
Log management and SIEM fundamentals: Mitigating security threats
In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a thorough audit of your network. Now that we’ve got the basics...