Blog
Connected Devices Remain the Most Popular Data Leakage Channel
04.12.2023
SearchInform together with its partner NEXTA ÇÖZÜM surveyed representatives of 100 Turkish leading companies to find out how their experts ensure data leaks protection, whether they are planning to increase data security budgets and what data channels their security officers consider the riskiest.
(In)Secure Digest: The Case of Classic Phishing Attack, Scammers Among the Team and the Dangerous Vulnerability
30.11.2023
In this November digest we gathered interesting and illustrative incidents related to data leaks, fraud and hacks.
Ways to Ensure Children’s Safety on the Internet: Cybersecurity Experts’ Views and Advice
20.11.2023
On the occasion of World Children’s Day, we share an article, containing recommendations and a few tools, which can help to protect children from inappropriate content on the Internet.
Deepfake Science Basics: How are They Created and how to Detect Them
14.11.2023
Alex Drozd, CISO of SeachInform, sheds light on deepfakes and how they are created.
(In)Secure Digest: a Leak via Contractor, Hack of Airline and Case of Corporate Fraud
01.11.2023
At the end of the month, traditionally, we’ve gathered a selection of high-profile IS incidents.
Which Aspects of Information Security it’s Crucial to Address for SMEs?
26.10.2023
Learn more about the methods of cyber-attacks that SMEs owners should be aware of.
Cyber Attack Detection: What are the Risks of Delay in the Detection and Response and how to Speed up the Attack Discovery Process?
13.10.2023
Read the article to find out how to detect a cyber attack just in time and what are the best practices are for detecting cyber attacks.
A Case in Point: You’ve got Mail
03.10.2023
Recently, it was the birthday of electronic mail. To celebrate the occasion, we would like to share the case study from our practice that involves email.
(In)Secure Digest: Pizza Lovers' Data Theft, a Million-dollar Fine and Aircraft Suppliers’ Data Leak
03.10.2023
It's time for the traditional monthly review of "classic" and non-trivial IS incidents reported by the media.
Not all the DLP Solutions are Equally Useful: How to Choose the System and not be Disappointed
29.09.2023
In this article we will examine, DLP class systems reproaches are fair and which ones are unfair and will reveal, which limitations are typical for all DLP systems and which are in fact disadvantages of some specific products.
E-mail Compromise: How to Protect Business Against BEC-attacks
27.09.2023
The senior analyst at SearchInform, Sergio Bertoni reveals, why BEC attacks are so popular and how to protect against them.
SearchInform Solutions’ 2023 Updates: Migration to PostgreSQL, Informative Metrics and Control of FTP Connected Servers
20.09.2023
In the digest on SearchInform solutions’ updates we’ve gathered details on a few major updates up to date.
How to Train Employees in Information Security Related Issues Efficiently
18.09.2023
In this article, Sergio Luis Bertoni, Leading Analyst at SearchInform will share my observations, based on the practical experience in the sphere of educational courses development.
A Case in Point: Set a Search Rule to Catch a Thief
15.09.2023
It's time to present a compelling case study that underscores the criticality of maintaining comprehensive visibility into your organization's file system.
(In)Secure digest: “shadowy” Amazon, de-anonymization of Northern Ireland police officers and pseudo-hackers
31.08.2023
Plenty of confidential data related incidents happened this month: in Australia, the data of participants in a cybersecurity survey was inadvertently disclosed, in Northern Ireland data on all police officers was disclosed, and in India, an employee was caught leaking data (once again).
SearchInform SIEM system – out-of-the box analytics and proactive incident management
21.08.2023
Nowadays, the number of both internal and external information security threats is growing steadily. Employees in charge of numerous organizations worldwide tend to understand the necessity to implement a SIEM class solution, which detects security events within the digital infrastructure.
(In)Secure Digest: a patented data leak, Bangladeshi open register and water treatment plant hack
03.08.2023
The time has come to find out if July was full with information security incidents. In our traditional digest we've gathered the most memorable incidents.
A case in point: The thirst for revenge
14.07.2023
Over the years of working, we have collected a large number of interesting cases. Some of them are amusing, some of them are surprising, but most of them has prevented serious losses for our clients. So, we figured: Why not share them with you?
Sales Manager Training for Partners
12.07.2023
Yamen Mustafa, Regional Managing Director Middle East and North Africa and Mohamed Salah Sayari, International Sales Manager and Business Development African Network, will provide a Sales training for our partners.
Human Vulnerabilities in Cyber Security
03.07.2023
As technology continues to advance, one persistent problem remains: the vulnerability of humans to cyberattacks.
(In)Secure Digest: theft of national secrets, a rogue VPN, and a fine for security guards' curiosity
29.06.2023
Here's our monthly roundup of noteworthy information security incidents from June.
Implementation department specialists' workdays: millions of questions and the requirement to know literally everything
27.06.2023
Implementation department employees can help customers to quickly manage to work with our solutions and benefit as much as possible from the software usage.
MSSP vs MDR
21.06.2023
MSSP vs MDR: what should you choose? This article will help you understand which one suits to your business needs better.
Risks of neural networks and chat bots usage
19.06.2023
SearchInform expert reveals artificial intelligence usage related risks and shares advice on how to mitigate them.
How to put on a vacation
05.06.2023
Summer is a really busy time for us. A lot of flights, trips, and then... well, vacations! For CISOs, the travel and vacation period can be a very difficult time. That’s why we implement a few strategies to ensure secure access and help employees not to forget all the IS rules while they're on the road. Let's have a look at the checklist and find out, how we do it.
(In)secure digest: data leaks with mileage, refuse to use AI and hack of an account
31.05.2023
The time has come for our traditional gather of so-called classic and extraordinary information security incidents, which were reported by mass media. In this digest we’ll reveal details on the following cases: data incident, which had lasted for ten years; hack of account of the employee, who hasn’t even set to work; unexpected cyber holidays.
Risk Management Certification
24.04.2023
Let's consider one of the most significant frameworks for managing risk is ISO 31000, an international standard that provides principles, best practices, and guidelines for managing risk in organizations.
More than half of companies limit their protection with nominal information security literacy
06.04.2023
A research on how companies prefer to train employees in information security and what methods do they implement
(In)Secure digest: if there was the “Darwin Award” in information security sphere – 2023 edition
05.04.2023
In this April compilation, you’ll find details on aquarium fraudsters, the financial manager, who squandered the company's money, "super-secure" apps, but something went wrong with them and much more.
EPP vs EDR
31.03.2023
What is the difference between EPP and EDR? Do they complement each other or they should be used separately?
Certified Risk and Information Systems Control (CRISC)
27.03.2023
Сybersecurity and risk management certification: ISACA and ISC
Best Digital Forensics Certifications
24.03.2023
The article helps you answer the three most important questions when choosing the right IT security and digital forensics certification.
(In)secure digest: enormous data leaks and insider’s revelations
02.03.2023
The time has come to discuss major data realted incidents, which happened in February.
Which sources should be controlled by the SIEM system first of all?
22.02.2023
It is very useful to maximize the SIEM system load to make sure that you won’t face a situation when something does not work appropriately in the real-life circumstances.
The SearchInform DLP deals with the smartphone threat
16.02.2023
Learn how the SearchInform DLP functionality helps to detect, whether an insider has a smartphone in hands.
What Are the Major Security Threats That Can Be Expected Through an Email?
16.02.2023
Learn more about the email risks and how to counter them.
The SearchInform DLP detects phishing and why would you need this functionality in the DLP class tool?
13.02.2023
Learn how the atypical DLP functionalty enhances your corporate protection.
(In)secure post New Year digest: “temporary” failures, corporate insider and data on everyone
02.02.2023
The time has come to discuss what happened while we were on a vacation.