Sekuro Media

We Are Sekuro

The global cybersecurity market continues to outperform expectations due to rapidly increasing threats and changing regulatory landscapes. At all levels – as nations, businesses, communities and individuals – cyber is the new battlefield and, in that context, resilience is paramount to be able to go forth and innovate. Security requires a keenly aligned defensive capability

We Are Sekuro Read More »

SOC 2 Explained

I’ve heard SOC 2 mentioned in various cybersecurity contexts, but I have no idea what it is. Does it have anything to do with security operations? Much of the confusion about SOC 2 is because there is another acronym used in the world of cybersecurity – SOC – that refers to a security operations centre.

SOC 2 Explained Read More »

What is Credential Stuffing?

Credential stuffing is one of the most used attacks adversaries rely upon to establish a beachhead in their victim’s networks. Attackers gather usernames and passwords from multiple breaches, merging them into a unified list to use against their victims.  It’s a well-known fact that employees frequently reuse their passwords, with an average of 13 times reported by LastPass

What is Credential Stuffing? Read More »

CORIE: A Game Changing Financial Services Security Framework

A new security framework, developed by the Council of Financial Regulators (CFR), that focuses on cyber resilience and maturity assessments is hitting the financial services world very soon. This approach, known as the Cyber Operational Resilience Intelligence-led Exercises (CORIE) framework, is in early pilot stages, but is set to take the world by storm when

CORIE: A Game Changing Financial Services Security Framework Read More »

Bypassing 2FA is Possible

Most of us know that multifactor authentication (MFA) is a useful tool for managing and securing passwords, and many web services integrate it into their logging in processes for both business and personal use. There is no doubt that a properly implemented MFA solution will help mitigate against brute force attacks, and credential stuffing, but

Bypassing 2FA is Possible Read More »

Scroll to Top