The importance of cyber security awareness training in 2023

Cyber security threats continue to evolve and as technology becomes more advanced. So too do hackers and the methods they use to attack businesses. With that in mind, we’ll be exploring the importance of cyber security awareness training in 2023. We will also cover some important points for consideration to ensure that the training it […]

Read More

What is Governance, Risk, and Compliance?

Businesses operating online today have a lot to juggle with constantly changing rules and regulations. As well as managing their cybersecurity risk profile. Historically, organisations followed mandated government regulations, complying with industry rules, and accounting for risk separately. However, they can now all be brought under one model known as GRC (Governance, Risk and Compliance). […]

Read More

AppCheck Security Blog – When Encryption Goes bad

Customers new to the AppCheck platform can often be surprised at the number of vulnerabilities that AppCheck highlights relating to transport encryption offered on their services – unencrypted (plaintext) services, web applications with vulnerable cipher suites, encryption libraries containing exploitable flaws, registration forms that email users passwords in clear text. The list of checks that AppCheck performs […]

Read More

AppCheck vs OWASP Top 10 Vulnerabilities

What is the OWASP top 10? How does AppCheck stack up against the top 10? OWASP (Open Web Application Security Project) is an organisation that provides unbiased information and advice around computer and internet applications. The OWASP community regularly come together to review what it believes to be the ten most critical security risks to […]

Read More

HTTP Verbs and Their Security Risks

Ask us about your FREE AppCheck Trial In this article we’ll look into what HTTP “verbs” or methods are, how each varies and works, and what the potential security risks are that should be considered with each. We’ll also see how vulnerability scanners such as AppCheck can automatically check for many of the potential vulnerabilities […]

Read More

The Importance of Vulnerability Scanning with AppCheck

Why Regular Vulnerability Scanning is Important Why Conduct Vulnerability Scans? Every year, Verizon Communications Inc, a multinational telecommunications conglomerate, publishes a report known as the Verizon Data Breach Investigations Report. The report compiles data from over 40,000 security incidents within the last 12 months experienced in a range of public and private sector organisations and uses it to […]

Read More

CyberWhite’s Seven Questions With – Steven Hope, Authlogics

Steven Hope Interview – Authlogics Join us in the first of our ‘7 Questions With…..’ series as we sit down with key people in and around the cybersecurity industry.  We’ll find out what drives them in the pursuit of making people and organisations more secure in the cybershere and what makes them different. First up […]

Read More

Are palm prints more secure than fingerprints?

With the news that Amazon has launched its own palm scanning technology that allows its customers to buy items with their palm print by way of biometric scanning, we asked our own Chief Technology Officer at CyberWhite, David Horn his thoughts on palm scanning technology. Palm recognition according to Amazon, is designed to be highly […]

Read More

The End of the “Golden Era” of Dark Web Marketplaces

On 22 Sep 2020, a joint international operation resulted in 179 individuals’ arrest and the seizures of USD 6.5 million and 500 kilograms of illicit substances. The successful outcome of Operation DisrupTor (pause for appreciation of the operation name) elicited some strong words from the head of Europol’s European Cybercrime Centre (EC3). According to the […]

Read More