Skip to content

Blog

Macy’s Breach November 2019

Macy’s is a popular shopping destination and a breach before christmas shopping is a scare. On October 15 it notified customers of a magecart card-skimming device. The unauthorized code on payment page (checkout & wallet) could have accessed name, address, city, phone, email, payment card number, card security code, card month/year of expiration. Why It… Read More »Macy’s Breach November 2019

(Round Table) Shadow IT Risks And Controls : Managing The Unknown Unknowns In Deep & Dark Web

We were happy to participate in a community round table organized by CISO Platform Key Discussion Points :  What is Shadow IT? What are the types of Shadow IT? Practical demo using open source tools Controls to manage shadow IT risk Reason Of Risk :  No standardization Unknown risks Security breaches Data leaks Types Of… Read More »(Round Table) Shadow IT Risks And Controls : Managing The Unknown Unknowns In Deep & Dark Web

Download Report – 9 Critical Capabilities For Digital Risk Protection Program

[Report] 9 Critical Capabilities Needed For Digital Risk Protection Digital Risk Protection ( DRP ) is a term possibly popularized or coined by Forrester to describe the market of tools and technologies to protect from the risks posed by externally facing digital assets. As per Forrester: “Most buyers (77%) are purchasing DRP tools as net-new… Read More »Download Report – 9 Critical Capabilities For Digital Risk Protection Program