Category: Article
-
Amazon Security Lake
Amazon Security Lake, initially introduced as a preview release at the 2022 re:Invent event, has now reached general availability. This powerful service allows organizations to centralize security data from various sources, including Amazon Web Services (AWS) environments, software as a service (SaaS) providers, on-premises systems, and cloud sources. The data is stored in a purpose-built data lake…
-
Google Drive Deficiency Allows Attackers to Exfiltrate Workspace Data Without a Trace
A recent discovery by researchers from Mitiga reveals a significant forensic security deficiency in Google Workspace that allows threat actors to exfiltrate data from Google Drive without leaving any trace. The lack of activity logging in the free subscription of Google Workspace exposes enterprises to potential insider threats and data leaks. Let’s delve into the…
-
If it’s fishy – a sign that it’s phishing
Cybersecurity Awareness Month is a reminder to the general public and organizations about the importance of cybersecurity. This year, Israel National Cyber Directorate (INCD) will focus on raising awareness of phishing messages among people and companies in Israel under the title “If it’s fishy – a sign that it’s phishing”. About 51% of the reports from people…
-
Critical Aspects of Industrial Control Systems (ICS) Security
Industrial Control Systems (ICS) is one of the most important areas of business. They can help automate tasks, improve performance, and ensure safety. However, they can also be abused if not properly managed. Here are a few critical aspects to consider for ICS security: What is Industrial Control Systems (ICS) Industrial Control Systems (ICS) are…
-
Cybersecurity Awareness Month 2022 – See Yourself in Cyber
Since 2004, October is Cybersecurity Awareness Month, helping individuals protect themselves online as threats to technology and confidential data become more commonplace. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) lead a collaborative effort between government and industry to raise cybersecurity awareness nationally and internationally. Cybersecurity Awareness Month Theme – See Yourself in Cyber This…
-
The GDPR: What is the General Data Protection Regulation
The EU General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy that aims to enhance individuals’ control and rights over their personal data and to simplify the regulatory environment for international companies. What is the GDPR all about The GDPR governs the privacy of personal data. This includes…
-
OTORIO Secures US Patent for Innovative OT Cybersecurity Risk Management Model and Algorithm
OTORIO, a leading provider of operational technology (OT) cyber and digital risk management solutions, has secured a patent from the U.S. Patent and Trademark Office (USPTO) for the company’s risk management model and attack graph analysis algorithm. This marks a significant milestone for OTORIO’s proprietary technology, further validating the company as a pioneer in the…