Axie Infinity – Ronin Network loses $620m in the largest-ever crypto heist

nomad token b

Axie Infinity is the biggest gaming platform that rewards users for playing games. Ronin Network, which is also owned by Vietnamese parent company Sky Mavis, allows players to exchange the digital coins they earn in […]

Approaching cyber security with a hacker’s mindset

nomad token bridge hack

Organisations today need security experts who use the unpredictability of ethical hackers to build constantly evolving, next-generation cyber security programs for greater business resilience. Relentless, highly intelligent, computer whiz, remarkable understanding of human psychology – […]

Cyber Threat Intelligence: A proactive approach to information security

Cyber threat intelligence

Enterprises must look at advanced cyber threat intelligence (CTI) solutions as an investment rather than cost. CTI is a vital component of an advanced cybersecurity program to monitor and identify threats, and act quickly to […]

Log4j 2 vulnerability (CVE-2021-44228) – All that you need to know

log4j vulnerability

What is Log4j? A new vulnerability has shaken cyberspace in the last few days creating great chaos. Known to be privately reported to Apache on November 24, it was made public on December 10. As […]

How Vulnerability Assessment and Penetration Testing (VAPT) can address gaps in your cybersecurity strategy

vapt audit

While developing an application, it’s very easy to leave security aspects for later. Functionality is key, your app is secure in the way it’s been designed, and you see no necessity to assess it for […]

Security Compliances – A must for organizations

compliences security

What happens if organizations don’t meet compliance requirements? When building an application or website, organizations are responsible for the Security Compliances information being gathered, and how it will be used. This is fundamentally the story […]

Security Operations Centre (SOC) as a service – strengthening cyber security for SMEs

Secur Operaitytiosn Centre

Have you noticed police officers at traffic signals, or security guards patrolling malls? They are part of a sophisticated security system designed to predict threats and prevent them. They usually receive instructions from a security […]

Secure your micro services-based architecture

microservice architecture

Tight security controls and configurations along with third party security reviews will ensure that your container application environment cannot be easily breached. Entersoft offers Cloud Configuration Review that includes microservices based architectures for small and […]

Cyber Security isn’t Always Built in with SaaS Security Solutions

SaaS security

Model for Enterprises and SaaS is a Preferred Software Providers The days of buying software at a premium and installing it on systems using an exe file are gone. Most organizations have moved to a […]