Australia is under attack!

Australia’s recent run of serious data breaches has left many commentators asking some very pressing questions. It seems as though there’s perhaps a lot more to it than meets the eye. Yes, one could describe […]

How do you evaluate an external cybersecurity vendor?

external cybersecurity vendor

With cybercrime on the rise, every organization, whether a large enterprise or a startup, should have expert cybersecurity professionals on the team, or onboard a trusted partners. Even if a company has an internal information […]

A guide to CIS Benchmarks

A guide to CIS Benchmarks

CIS benchmarks are specifically followed to secure applications at the configuration level. These activities include server hardening, cloud configuration reviews, browser or database hardening, etc. While OWASP provides insight on application security and common vulnerabilities […]

The Evolving Landscape of BFSI & Fintech Industry: Challenges & Solutions

BFSI and Fintech challenges

In the midst of digital transformation and the adoption of emerging technologies such as Cloud, cybersecurity challenges continue to grow in the fintech & BFSI space. To address this, it’s important to consider certain risks […]

Edtech – The New Prime Target For Cyber Attacks This Year

Children are the most vulnerable of us. As an edtech business, it is your responsibility to protect your students’ data and private information, at all costs. Are you prepared?

Covid-19: How to keep your organisation safe

the number of COVID-19-related cyberattacks has increased

With the World Health Organization (WHO) announcing Coronavirus Disease 2019 (COVID-19) as a pandemic, organizations worldwide are being asked to shift to a remote workforce to curb its spread. Capitalizing on the situation are hackers […]

Web Application Firewall

Digital transformation is driving more and more enterprises to migrate a large number of their services to the cloud. In the face of increasing frequency of Distributed Denial of Service (DDoS) and automation attacks against […]

8 years of Cybersecurity at Entersoft

This year marks the 8th year of cybersecurity at Entersoft Security! Firstly, a big thank you to all our clients, partners, and employees for all your support through the years. Entersoft was launched with a […]

Securing AWS Cryptographic Keys

Securing AWS Cryptographic Keys from cyber attack , enabling security features, is becoming a tough task nowadays. Recently, an AWS employee, DevOps Cloud Engineer, leaked over a gigabyte worth of data to a personal GitHub […]

OWASP TOP 10 API SECURITY RISKS

API SECURITY

Why OWASP API Top 10? The Open Source Web Application Security Project has compiled a list of the 10 biggest OWASP API security threats faced by organizations. According to the Gartner API strategy maturity model […]