- Telecom Services
- OT Security services
- CONSULTANCY
- RISK ASSESSMENT
- REGULATORY COMPLIANCE
- ASSET HARDENING
- NETWORK SEGMENTATION
- OT ASSET INVENTORY
- OT VULNERABILITY ASSESSMENT
- PENETRATION TESTING
- INCIDENT RESPONSE
- INDUSTRIAL SECURITY TTX
- STAFF AUGMENTATION
- OT CYBER SECURITY FRAMEWORK
- OT CYBER SECURITY PROGRAM
- DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
- MALEVOLENT THREAT ACTOR MONITORING
- Capital Project Assurance
- Architecture Assessment
Daily Archives: 19/12/2024
Rubrik enables rapid cyber recovery through Turbo Threat Hunting
The product, which is now in beta for Rubrik Enterprise Edition and cloud customers, aims to address challenges associated with prolong...
Report highlights growing security risks from unmanaged machine identities
Venafi's latest report, The Impact of Machine Identities on the State of Cloud Native Security in 2024, reveals critical security chall...
Researchers uncover AMD chip flaw threatening cloud data
Security researchers have identified a vulnerability in AMD processors that they have dubbed badRAM and which could allow threat actors...
Keepit secures $50M | SC Media
Keepit, a provider of software-as-a-service data protection and backup solutions, has secured $50 million in funding, raising its total...
Apple patches TCC bypass vulnerability
Apple has addressed a critical flaw in its iOS and macOS systems that could bypass the Transparency, Consent, and Control framework to ...
Rise in hands-on-keyboard cyberattacks highlights detection challenges
Despite advancements in AI-enhanced cyberattacks, manually executed hands-on-keyboard attacks remain a growing threat heading into 2025...
RansomHub emerges as dominant ransomware group as 2024 ends
TechTarget reports that RansomHub has become the leading ransomware-as-a-service group following the dismantling of LockBit earlier thi...
Citrix acquisitions poised to enhance zero-trust security
Citrix Systems has announced the acquisition of companies deviceTRUST and strong.network to pursue its goal of strengthening its zero-t...
Criminals using Google Calendar email invites to steal data from users
Cybercriminals were observed manipulating the emails to Google Calendar invites to fool users into clicking on malicious links or attac...