AWS

Guidelines for securing Content Management Systems

The Australian Cyber Security Centre (ACSC) has released new guidelines to assist organizations in securing Content Management Systems (CMS). The guidelines include good mitigation advice in areas of patching, account management, hardening and monitoring to name a few.

Guidelines for securing Content Management Systems Read More »

Microsoft introduces Application Inspector

Microsoft has introduced a new source code analyzer tool dubbed Microsoft Application Inspector. The tool is designed to “identify interesting features in source code” and can help enable developers understand software components your apps use.

Microsoft introduces Application Inspector Read More »

Top 3 AWS security configuration mistakes

Cloud security experts from Palo Alto Networks have warned about three critical misconfigurations that are most common in most organizations and have contributed to the majority of cloud attacks.

Top 3 AWS security configuration mistakes Read More »

Massive Breach at Uber covered up

Uber suffered a massive data breach in October 2016 and paid hackers $100,000 to keep quiet about it and delete the data. The breach resulted in the loss of sensitive personal information on nearly 50 million Uber users and 7 million Uber drivers.  According to the current CEO Dara Khosrowshahi, the personal data included drivers licenses

Massive Breach at Uber covered up Read More »

6 Important Safeguards To Stop Insider Threats

Insider threats can be malicious or inadvertant, but the consequences can lead to costly brand damage or significant financial losses to your company. Understanding the types of insider threats and corresponding risk indicators can help minimize impact and damage caused by such threats.

6 Important Safeguards To Stop Insider Threats Read More »