Leveraging HITRUST Compliance to secure and stay ahead
Maintaining compliance across a chaotic security environment is always daunting. The Client chose HITRUST as a standard and requested Propelex to help the them identify gaps and achieve certification.
5 Cybercrime Scams Security Pros Almost Fell For
Cybercrime is a huge problem for both individuals and businesses. Scammers are constantly coming up with new ways to trick people into giving them their personal information or their money. In this article, we will look at 5 cybercrime scams security pros almost...
Apple Patches Zero-Day Exploits
Apple patches zero-day exploits. Stay secure with the latest updates and protect your devices from potential vulnerabilities. Anyone with an iPhone released since 2015, iPad released since 2014, or Mac running the latest macOS Monterey should update their software...
Is Your Security Posture Getting Worse?
Is your security posture getting worse? Assess the state of your defenses and take action to strengthen your cybersecurity. Despite increased attention to cybersecurity, many companies remain vulnerable to cyberattacks. In fact, according to the vulnerability...
Kaspersky Survey: Cryptotheft Experiences
Insights from Kaspersky survey on cryptotheft experiences. Explore the findings and enhance your cryptocurrency security. According to Kaspersky, a security company that offers online and crypto-related services, users of cryptocurrency should be extra vigilant and...
Unstructured Data Protection Efforts
Enhancing unstructured data protection efforts. Learn how to secure and manage your organization's valuable data assets. Unstructured data, comprising 80%-90% of the modern enterprise, is extremely valuable. But if it gets into the wrong hands, that value could be...
Acer Confirms Data Breach
Acer confirms data breach. Get the latest updates on this cybersecurity incident and safeguard your information. Acer is facing a serious data breach after a hacker posted a 160GB dataset of the company’s confidential files on a hacking forum. The data was...
SVB Meltdown: Impacts Cybersecurity Startups
SVB (Silicon Valley Bank) meltdown and how it impacts on cybersecurity startups. Explore the repercussions in the tech ecosystem. The collapse of Silicon Valley Bank was a reckoning moment. It halted startup funding momentum and forced banks to be more cautious....
Fitness Apps Leak Location
Fitness apps leak user location data. Stay informed about the privacy concerns and ways to protect your information. Fitness apps have become ubiquitous and most appeal to the general masses. However, there are a few that focus on specific workouts. These apps are...
Okta Post Exploit Method Exposes User Passwords
Okta post-exploit method exposes user passwords. Learn about the security implications and mitigation strategies. A post exploit method discovered by researchers at Mitiga allows threat actors to read cleartext passwords stored by the IAM provider Okta. This could...
Futuriom 50 Pick Normalyze Grants Patent For DSPM
Futuriom 50 pick, Normalyze, grants a patent for Digital Signal Processing Monitoring (DSPM) technology. We’re used to hearing vendors toot their own horns, but this one is worth a double-take: Futuriom 50 pick normalyze has been granted a patent for its...
Network Detection and Response Market
The Network Detection and Response (NDR) market: An overview of trends, growth, and evolving cybersecurity solutions. The NDR market is evolving rapidly, driven by the need for more effective security solutions in cloud-based environments. New technologies like AI...
The Ethics of Network and Security Monitoring
Exploring the ethics of network and security monitoring. Delve into the moral complexities of digital surveillance. The increase in working from home and the merging of professional and personal lives has created new methods for monitoring employees, including some...
The Cyberattack Targeting Oscar-Nominated Film-Fans
The cyberattack targeting Oscar-nominated film-fans. Stay informed about this intriguing cybersecurity incident. In a bid to get the latest blockbuster movies, some movie fans are turning to piracy. But, according to researchers at ReasonLabs, they may also be...
Post-Quantum Satellite Protection: Towards Reality
Post-Quantum Satellite Protection: Progressing towards a secure reality. Explore the future of satellite cybersecurity. In a new test, researchers have successfully created a data transmission channel that can resist quantum decryption. This is vital for protecting...
Polish Politburo Accused of Using Spyware
Allegations against Polish Politburo: Accused of employing spyware. Delve into the unfolding espionage controversy. Revelations about Pegasus have shown that states can use software like this to spy on their own citizens and undermine the credibility of digital...
Decentralized Identity: Approaching an Inflection Point?
Decentralized identity: Is it approaching an inflection point? Explore the potential shifts in digital identity management. When users control their identity identifiers and credentials and can move them from one service to another, it opens up many new...
GoDaddy Discloses Security Breach
GoDaddy discloses security breach. Stay informed about the latest developments in this cybersecurity incident. GoDaddy is a domain name registrar and web hosting provider with more than 20 million customers worldwide. The company recently admitted to a massive data...
Rapid7 Acquires Minerva Labs
Rapid7 strategic move: Acquires Minerva Labs to extend ransomware detection and response services. Boston-based Rapid7 supplies cybersecurity tools that allow enterprises to identify malware and infrastructure weaknesses. It also offers a managed detection and...