4 Cyber Risk Management Imperatives To Accelerate Digital Transformation Recovery

Cyber Risk Management maturity during digital transformation is associated with enhancing brand trust and reliability. Recovery from disruptions during COVID-19 pandemic has been slow and sporadic. Targeted and accelerated digital transformation initiatives can bring back […]

Covid-19: How to keep your organisation safe

With the World Health Organization (WHO) announcing Coronavirus Disease 2019 (COVID-19) as a pandemic, organizations worldwide are being asked to shift to a remote workforce to curb its spread. Capitalizing on the situation are hackers […]

Web Application Firewall

Digital transformation is driving more and more enterprises to migrate a large number of their services to the cloud. In the face of increasing frequency of Distributed Denial of Service (DDoS) and automation attacks against […]

8 years of Cybersecurity at Entersoft

This year marks the 8th year of Entersoft Security! First off, a big thank you to all our clients, partners, and employees for all your support through the years. Entersoft was launched with a concentrated […]

Securing AWS Cryptographic Keys

Securing sensitive data that resides on Amazon Web Services (AWS), enabling security features, is becoming a tough task nowadays. Recently, an AWS employee, DevOps Cloud Engineer, leaked over a gigabyte worth of data to a […]

Vidar Malware

Introduced in December 2018, Vidar is a family of malware and trojan horse virus that steals sensitive information and cryptocurrency from infected users. Presumed to have originated in Russia, Vidar is a family of malware […]

Secure Yourself From The Digital Grinch

It’s the holiday season! And while you are busy shopping, the Grinch is lurking just around the corner. Global consumers are predicted to spend Ghost of Christmas Past 43% of holiday shopping identity theft occurs […]

OWASP TOP 10 API SECURITY RISKS

Why OWASP API Top 10? The Open Source Web Application Security Project has compiled a list of the 10 biggest API security threats faced by organizations. According to the Gartner API strategy maturity model report, […]

RF Hack using SDR Dongle

Radio Frequency plays a vital role in IoT(Internet of Things), in devices like vehicle monitoring, remote control, wireless data transmissions, garage Openers, etc. Want to understand the basics of RF or other types of frequencies. […]

Open-source Intelligence

Have you ever thought that the Amazon AWS access credentials of your company can be found in GitHub? Assume that, your company is relying on amazon web service and GitHub and the web application server […]