Advanced Persistent Threats (APTs) in Fintech: A Guide to Bolster Cyber Resilience

In the dynamic fintech landscape, the shadow of Advanced Persistent Threats (APTs) looms large. APTs, intricate cyberattacks with the goal of establishing a prolonged network presence, have a special affinity for targeting large enterprises. The […]

Australia is under attack!

Australia’s recent run of serious data breaches has left many commentators asking some very pressing questions. It seems as though there’s perhaps a lot more to it than meets the eye. Yes, one could describe […]

A guide to CIS Benchmarks

A guide to CIS Benchmarks

CIS benchmarks are specifically followed to secure applications at the configuration level. These activities include server hardening, cloud configuration reviews, browser or database hardening, etc. While OWASP provides insight on application security and common vulnerabilities […]

Edtech – The New Prime Target For Cyber Attacks This Year

Children are the most vulnerable of us. As an edtech business, it is your responsibility to protect your students’ data and private information, at all costs. Are you prepared?

Covid-19: How to keep your organisation safe

the number of COVID-19-related cyberattacks has increased

With the World Health Organization (WHO) announcing Coronavirus Disease 2019 (COVID-19) as a pandemic, organizations worldwide are being asked to shift to a remote workforce to curb its spread. Capitalizing on the situation are hackers […]

Web Application Firewall

Digital transformation is driving more and more enterprises to migrate a large number of their services to the cloud. In the face of increasing frequency of Distributed Denial of Service (DDoS) and automation attacks against […]

8 years of Cybersecurity at Entersoft

This year marks the 8th year of cybersecurity at Entersoft Security! Firstly, a big thank you to all our clients, partners, and employees for all your support through the years. Entersoft was launched with a […]

Securing AWS Cryptographic Keys

Securing AWS Cryptographic Keys from cyber attack , enabling security features, is becoming a tough task nowadays. Recently, an AWS employee, DevOps Cloud Engineer, leaked over a gigabyte worth of data to a personal GitHub […]