Testing your APIs
Kaon Security Blog
by
1M ago
In the world of software development APIs, short for Application Programming Interface, act as a bridge between different software applications facilitating communication and interactions. An API encompasses the rules, protocols, and tools to enable integration and interoperability between different systems. APIs can be at the core of a digital tra ..read more
Visit website
Data Breach Costs Continue To Rise: Is Your Incident Response Plan Ready?
Kaon Security Blog
by
2M ago
The IBM Cost of a Data Breach report states, that, when compared to 2020 the average cost of a data breach in 2023 increased by more than 15%. The report also adds that IR planning and testing emerged as a highly effective tactic for containing the cost of a data breach. Is your team set up to respond in the event of an incident ..read more
Visit website
Are you ready for the unexpected?
Kaon Security Blog
by
4M ago
When did you last review the contents of your IT disaster recovery plan and put it to the test? An effective IT disaster recovery plan is essential to ensure that business continuity can be maintained in the face of any unforeseen events. If not regularly reviewed and updated then there are implications for the effectiveness of the plan should it b ..read more
Visit website
Policy Management as a Service October Enhancement Release
Kaon Security Blog
by
6M ago
Kaon Security are happy to announce the upcoming release of new and enhanced features for Policy Management as a Service (PMaaS). During October the following new functions will be provided with this release ..read more
Visit website
Securing Your Future
Kaon Security Blog
by
7M ago
An organisation's overall approach and readiness in protecting its digital assets, systems, and data from cyber threats and attacks is commonly referred to as its IT security posture. An organisation's IT security should comprise of a combination of policies, practices, technologies, and strategies that are being used to manage and mitigate IT secu ..read more
Visit website
Black Box penetration testing – why you should get it done!
Kaon Security Blog
by
9M ago
Black box penetration testing provides a holistic view of how secure your organisation is from a bad actor’s point of view, i.e. knowing little about your organisation. The technical part of a black box penetration test looks to find vulnerabilities in your systems, networks and applications that attackers might exploit ..read more
Visit website
It's a hot topic!
Kaon Security Blog
by
9M ago
People are increasingly going to be using generative artificial intelligence (AI) systems at work and home with a view to increasing productivity, being more creative and make better data driven decisions. However, managing the risks of using generative AI is a hot topic and should be front of mind for organisations. Some steps worth taking to mana ..read more
Visit website
The old tactics work just fine
Kaon Security Blog
by
9M ago
The 2023 Data Breach Investigations Report released recently by Verizon makes for some interesting reading. The 89 page report uses data derived from the analysis of 16,312 security incidents, of which 5,199 were confirmed data breaches ..read more
Visit website
It's a hot topic!
Kaon Security Blog
by
11M ago
People are increasingly going to be using generative artificial intelligence (AI) systems at work and home with a view to increasing productivity, being more creative and make better data driven decisions. However, managing the risks of using generative AI is a hot topic and should be front of mind for organisations. Some steps worth taking to mana ..read more
Visit website
Taking Reasonable Care
Kaon Security Blog
by
1y ago
In our February newsletter we talked about the need to ensure that any third parties engaged to do work for your organisation preserve the confidentiality, integrity, and availability of your information. One of the steps you can take to make improvements in this third-party risk area, is the level of due diligence you should consider applying upfr ..read more
Visit website

Follow Kaon Security Blog on FeedSpot

Continue with Google
Continue with Apple
OR