How to Prepare Your Organization for an ISO 27001 Security Audit
Preparing for An ISO 27001 Internal Security Audit By Jordan MacAvoy ISO 27001 is the only standard that sets out the specifications for an information security management system (ISMS). Achieving ISO 27001 certification is no small feat and inspires confidence in an
The Twitter Cyber Scam – How Twitter Got Hacked
Twitter has suffered the most catastrophic attack in its history and one that directly affected many of its celebrity clients. On Wednesday, alleged hackers gained access to Twitter internal systems and tools which allowed them to compromise high profile accounts
Bug Bounty Programs are Becoming Increasingly Effective
What is the Difference Between Bug Bounty and Vulnerability Management Programs? In this blog, SecureOps Senior Penetration Tester Jasmin Landry has provided us deep insight into bug bounty programs in two previous posts: Bug Bounty Programs – Uncovering Critical Vulnerabilities https://secureops.com/penetration-testing/bug-bounty/ Unleashing Bug
How to Defend Against Magecart Skimming Cyber Attacks
Defending Against Magecart Skimming Cyber Attacks Prior to the holidays last year and a couple of months before the outbreak of the Coronavirus pandemic we wrote about our concern with regard to the increase in Magecart attacks against online retailers which