How to mature a threat hunting program with the ATT&CK Framework

John Wunder, Principal Cybersecurity Engineer at MITRE Corporation suggested in a recent webinar that the ATT&CK framework is the ‘obligatory pyramid of pain’. It is the first framework that looks at the behaviours of cyber attackers and their increasing sophistication

Bitglass warns of escalating insider attacks

Bitglass, the Next-Gen CASB company, has cautioned that insider attacks are escalating and that a significant number of organisations are failing to monitor user behaviour across their cloud footprints.

How to maintain cybersecurity across all your devices

Network administrators are under significant and increasing pressure to make sure their networks are designed and operated securely. So it is important that they have the right knowledge and tools to manage cybersecurity throughout the life cycle of the system.

Biometric Identification: Iris Recognition

Ever wondered how does the Iris Recognition work, how accurate it is and what makes it stand out from other Bio metric Identifications? Well we are going to discuss this today, so let’s just jump right into it But First Note that Iris Recognition is not the same as Retinal Recognition as retinal scanning is the ocular-based Bio-metric technology that matches unique pattern of an individual’s retina blood vessels.

Looking back on 2018’s security market activity – and the potential influence on 2019

While Axis is a company that always aims to look forwards, sometimes it is useful to pause for a moment and reflect on the recent past. As we near the end of 2018, it seems like a good time to take a look at some of the most significant activities and trends that have shaped the security industry over the past year, and which we feel will have an impact moving into the 2019 and beyond.

Tips for better Android mobile application security

Hence, no security measure can be indeed secure and provide fool-proof security for your android application. This means that an in-depth approach is essential for your android mobile security, which should include a good mobile application development lifecycle that includes multiple protection layers. Assess your mobile using a rigorous security assessment checklistso that you can identify any vulnerability that could be present with the Android mobile application.

Subcategories