Blog

Blog

Technology Audits and Consulting: Achieving Separation of Duty

Do you fear you don't have the talent or funds to be able to keep your business secure? Is your IT person maxed out on projects that adding infosec to her plate might be too much? How can you find the balance between getting the cybersecurity expertise your business requires while not breaking the bank?

The Information Security space has

Read More…

What Are Your #cybersecuritywins?

At Vala Secure, one of our core beliefs is to pursue educational challenges. We believe that if organizations want to improve their security game there needs to be a continued sense of fun and challenge to get better. If it’s not fun or challenging, it’s harder to get better. So we want to embody that each and every day and I’m excited to announce

Read More…

Cybersecurity: Not Just For Financial Institutions

For many years, financial institutions have understood the importance of having a strong cybersecurity strategy. As they handle valuable financial information and other sensitive data, these institutions have long been very attractive targets for hackers. As a result, they know they have to work hard to keep their customers’ accounts and data

Read More…

4 Things to Watch For When Running an In-House Penetration Test

Businesses that keep sensitive data on their computer networks need penetration tests to make sure hackers do not have access to the information. Testing often starts with a vulnerability assessment, which is an exercise that evaluates the network's security and creates a list of potential security flaws. By scanning the network, you can often

Read More…

How Safe is Public Wi-Fi?

The modern digital age is more convenient than ever. Not only can you walk around with a tiny supercomputer in the palm of your hand, you can use that supercomputer to connect to the entire world over the internet, with multiple options for network protocols. However, when it comes to the cybersecurity of your mobile devices and the data they

Read More…

5 Smart Tips to Back Up Your Data Now

In a world where every company’s business is increasingly its own data, it’s always a good idea to ensure that data is backed up. This is especially true in the way it encourages adopting a proactive security mindset, allowing small and mid-sized businesses to address the risk of a cyber attack or security breach before it happens.As ransomware

Read More…

What Small Companies Should Really Know About Cloud Security

While the bulk of data security breaches affect large corporations, hackers can target small and medium-sized enterprises (SMEs), too. As a result, small businesses — often deemed an attractive target by cybercriminals because these companies lack the infrastructure of multi-million dollar conglomerates — are investing heavily in cloud security.

Read More…

Throwback Thursday: Revisit Old Viruses at the Online Malware Museum

In these times of mega-hacks and massive data breaches,  technology risk assessment  has become a fact of life for every business. In comparison to automated botnets, the “good old fashioned” human hacking of yesteryear seems quaint, even a little nostalgic. Do you remember the malware and viruses from the 1980s and 90s? The Online Malware Museum

Read More…

How CISOs Can Improve the Cybersecurity Landscape

In larger environments, it is not uncommon to have both a CIO/CTO and CISO (Chief Information Security Officer). The CTO/CIO is usually held accountable for the development and implementation of the IT strategy to support the institution's business strategy in line with its risk appetite. A CISO is typically responsible for overseeing and

Read More…

5 Common Programming Languages That Cause the Most Software Vulnerabilities

Over the last couple of years, many cybersecurity problems have come to light. There has been a wave of WordPress and Drupal vulnerability warnings and patches, and SQL injection bugs are being found left and right in Web applications. Many of the bugs can be traced back to PHP, but other common programming languages can also cause

Read More…