Security news from the week beginning 20th March 2023
#Security news from the week beginning 20th March 2023 includes product updates from @Microsoft and @Secureworks
Nethone to detect all VPNS and proxies
Nethone has announced that it can now detect all VPNs and proxies to help reduce fraud. The move comes as research by the company shows that more than 80% of fraudsters...
ThreatQuotient report highlights the importance of automation in cybersecurity
ThreatQuotient has published its 2023 State of Cybersecurity Automation Adoption Research Report. The report has thrown up some expected results, such as the growing importance of automation in cybersecurity. It also...
Security news from the week beginning 15 January 2024
Security News from the week beginning 15th January 2024 includes stories from @JumpCloud, @Gatewatcher and @Egress
Nord vLEI becomes first European GLEIF vLEI Issuer
Nord vLEI has become the first European-based GLEIF Qualified vLEI (QVI) Issuer. The vLEI is a digitised version of the Legal Entity Identity. It provides automated authentication and verification of legal identities...
Will US legislation stop COVID-19 apps leaking user data?
COVID-19 contact tracing apps are leaking user data according to security company Avast. It claims that rushing apps to market has meant skimping on security. It means that cybercriminals can steal...
The White House issues cybersecurity principles for space
The White House has published its Cybersecurity Principles for Space Systems. The short document sets out the US position when it comes to protecting any systems that are located in space.
It...
Poor identity controls allow attackers to exploit Office 365
Poor identity and privilege access controls are causing problems across SaaS environments. They allow users more access than they need, especially with applications such as Office 365. For attackers, this is...
Logit.io launches advanced audit log
Logit.io launches an advanced audit log with smarter investigate ways for #DPO and #security analysts - @logit_io
What are the risks from software supply chain attacks?
An effective software supply chain attack is pure gold to a cybercriminal. It allows them to attack one company, and then use that company to spread the attack to all its...