How to Protect Your Business from OT Security Threats

Cybersecurity threats are growing in size and prevalence  – and the nature of cybersecurity is continuously shifting. In particular, operational technology (OT) such as industrial control systems – e.g. SCADA – are newly at risk. In this article we discuss why OT is so vulnerable, what vulnerabilities you should watch out for and what your […]

Read More… from How to Protect Your Business from OT Security Threats

Data Privacy in the Age of Regulations

This past year was a big year for data breaches, new privacy laws and cracking down on existing regulations. British Airways faces a £183m fine after hackers stole credit card details from nearly 400,000 customers. Many other big names were hit too. Facebook. Equifax. Twitter. Marriott. Google. They’ve all been hacked.  The reason? Sometimes it was due to […]

Read More… from Data Privacy in the Age of Regulations

In Vulnerability Assessment, Accuracy Is Vital

Testing for behavior vs version The primary requirement for a Vulnerability Assessment solution is accurate testing. Ease of use and clear reports are important, but if accuracy isn’t there then little else matters. Poor accuracy in Vulnerability Assessment produces two kinds of testing error. Overlooking a vulnerability (a false negative) leaves a security flaw you […]

Read More… from In Vulnerability Assessment, Accuracy Is Vital

5 Simple and Effective Tips to Protect from Cyber Attacks for Cyber Security Awareness Month

This article was originally published on EIN Presswire on October 07, 2019. SACRAMENTO, CALIFORNIA, UNITED STATES, October 7, 2019 /EINPresswire/ — To mark the month of October being Cyber Security Awareness Month, Beyond Security, a leading provider of automated security testing solutions, is providing 5 effective and easy to follow tips for protecting against Internet security […]

Read More… from 5 Simple and Effective Tips to Protect from Cyber Attacks for Cyber Security Awareness Month

CVSS Explained

What Is CVSS? The common vulnerability scoring system (CVSS) is open and free to industry for evaluating the seriousness of the software security vulnerabilities and is used in vulnerability management software. CVSS gives scores to vulnerabilities per the seriousness of the threat. Scores are computed considering several metrics. Scores are given between 0-10, with most severe score […]

Read More… from CVSS Explained

CVE Explained

About CVE ( Common Vulnerability Exposures/Enumeration) Common vulnerabilities and exposure gives common names to openly known security issues or vulnerabilities. The objective of CVE is to make it simpler to impart information over different databases and make available a common platform to evaluate security tools. What is a CVE scan? CVE depends on freely accessible […]

Read More… from CVE Explained

Microsoft is Right, Mandatory Password Changes are Obsolete

This article was originally published on Help Net Security on August 1 , 2019. Microsoft has recently come out and said that mandatory password changing is ancient and obsolete. This goes directly against everything we were trained to think for the last couple of decades, and against most compliance directives including some of the most dominant security […]

Read More… from Microsoft is Right, Mandatory Password Changes are Obsolete

IoT Device Testing Made Possible With BeStorm X

This article was originally published on TechTarget on April 22, 2019. In an international collaboration, U.S.-based Beyond Security and Japan-based Ubiquitous AI Corporation developed and launched BeStorm X, a vulnerability verification tool designed specifically to test IoT devices. The vendors claim the tool is an amalgamation of Beyond Security’s BeStorm version 7.6.8 and UAC’s IoT technologies. The […]

Read More… from IoT Device Testing Made Possible With BeStorm X