Remember when you clicked on a legitimate web application but were redirected to an entirely different site with malicious links? Then you have faced a very common web app vulnerability attack vector – a redirect […]
Author: Entersoft Team
The essential CISO toolkit
Cybersecurity has become a strategic area for organizations since it has a substantial business impact. The role of Chief Information Security Officers (CISO) has assumed even greater focus. As key business leaders, the onus on […]
Do you have the right IAM policies to secure your public cloud?
In a cloud security breach, the problem is misconfigurations in identity and access management (IAM policy). In a tight regulatory environment, a robust IAM policy can secure your cloud environment from inadvertent data leaks. A […]
Cybersecurity trends in 2021
From data security automation solutions to advanced threat intelligence, zero-trust approach to simulated training campaigns, the landscape is constantly evolving to stay ahead of potential threats. Cybersecurity has emerged as a pivotal arm for organisations […]
Approaching cyber security with a hacker’s mindset
Organisations today need security experts who use the unpredictability of ethical hackers to build constantly evolving, next-generation cyber security programs for greater business resilience. Relentless, highly intelligent, computer whiz, remarkable understanding of human psychology – […]
An SME guidebook to security with Kubernetes
If you are considering a microservices-based architecture to scale up your application or website to the next level, Kubernetes can be a great option to manage it. However, this makes layer-wise security even more important. […]
Do I need to do a source code review?
Writing code is the foundation of building an application. Think Mark Zuckerberg and his army of developers in the movie on Facebook. The smallest missteps could cause glitches at the functional level, and affect the […]
The Impact of Artificial Intelligence on Organization’s Security
The new-age technologies such as Artificial Intelligence (AI), Machine Learning (ML), and Robotics are driving the biggest technological and organizational changes since the 4th Industrial Revolution. However, these are associated with potential opportunities as well […]
Cyber Threat Intelligence: A proactive approach to information security
Enterprises must look at advanced cyber threat intelligence (CTI) solutions as an investment rather than cost. CTI is a vital component of an advanced cybersecurity program to monitor and identify threats, and act quickly to […]
Log4j 2 vulnerability (CVE-2021-44228) – All that you need to know
What is Log4j? A new vulnerability has shaken cyberspace in the last few days creating great chaos. Known to be privately reported to Apache on November 24, it was made public on December 10. As […]