Guidelines for securing Content Management Systems

The Australian Cyber Security Centre (ACSC) has released new guidelines to assist organizations in securing Content Management Systems (CMS). The guidelines include good mitigation advice in areas of patching, account management, hardening and monitoring to name a few.

Microsoft introduces Application Inspector

Microsoft has introduced a new source code analyzer tool dubbed Microsoft Application Inspector. The tool is designed to “identify interesting features in source code” and can help enable developers understand software components your apps use.

Massive Breach at Uber covered up

Uber suffered a massive data breach in October 2016 and paid hackers $100,000 to keep quiet about it and delete the data. The breach resulted in the loss of sensitive personal information on nearly 50 million Uber users and 7 million Uber drivers.  According to the current CEO Dara Khosrowshahi, the personal data included drivers licenses …

Massive Breach at Uber covered up Read More »

6 Important Safeguards To Stop Insider Threats

Insider threats can be malicious or inadvertant, but the consequences can lead to costly brand damage or significant financial losses to your company. Understanding the types of insider threats and corresponding risk indicators can help minimize impact and damage caused by such threats.