Incident Response Life Cycle

Incident Response Life Cycle

What is the Incident Response Lifecycle? With COVID-19 forcing businesses around the globe to shift to remote work, the cybersecurity landscape has changed significantly. Consequently, the complexity of protecting corporate infrastructure grew tenfold. It is...
How to comply with SHIELD act?

How to comply with SHIELD act?

Are you storing data and private information of New York residents? The state has enforced breach notification law Stop Hacks and Improve Electronic Data Security (SHIELD) Act updating the scope and requirements for consumers’ sensitive information protection. In...
New Feature in AWS: Traffic Mirroring

New Feature in AWS: Traffic Mirroring

Now security analysts are able to collect data fast and flexibly with a new feature. Traffic Mirroring in AWS has given an ability to transfer the traffic to a SIEM (like Splunk) and analyse it. This is targeted for cases when you need: -to analyze the...
Top cloud threats in 2019: secure your infrastructure

Top cloud threats in 2019: secure your infrastructure

A lot of companies prefer to use cloud environment in order to store clients’ data there. It is a convenient way and offers many flexibility. But how to make these remote storages well protected from cloud threats? According to Palo Alto...
IoT attack simulation and ways to protect

IoT attack simulation and ways to protect

Internet of Things rapidly changes lives of millions of people. The ramp up of technology also comes with security risks that are usually underestimated. In today’s world of “always on” technology and not enough security awareness on the part of users, cyber attacks...
Mac based antimalware training

Mac based antimalware training

Apple customers believe that no adversaries can hack their personal data or access important files. We bust this myth about perfectly secure MacOS devices! During our Security Awareness training, we demonstrate how anyone can break this system. Recently we have...