Every day a new threat is manufactured, and every day an innovative counter to that threat is created. Our industry moves quickly, and those that can't or won't keep up are fast left behind in high-risk territory.
At Xiph Cyber, our commitment to protecting your privacy and the sovereignty of your data means we invest a lot of time and effort in maintaining up-to-the-minute awareness of the shifts in our industry. You'll find the latest news and our own blogs right here.
What is spyware & how to protect yourself
Jun 21, 2023
It may sound like a gadget you’d hear about in a spy movie, but spyware is very real and malicious. You never see it coming and may not even be aware of it (until it’s too late), plus spyware can be very hard to get rid of.
Sandbox security defined
Jun 14, 2023
Anyone who’s ever been to a beach will know − sand gets everywhere. It’s the same deal when you code and use programs and web applications that can interfere with the rest of your operating system. Pairing programs or having various developers write code can get messy quickly, putting your operating system and devices at risk. Add potentially risky programs, misconfigured files, or code and things get downright dirty. That’s where sandboxing comes in.
How to get rid of spam emails
Jun 07, 2023
Nearly half of the emails sent worldwide are spam, according to Statista. Spam emails are a pervasive problem clogging up our email boxes and the number one attack vector for phishing attacks, malware, and cyber threats. We explain how to stop spam emails.
System hardening guidelines
May 31, 2023
Vulnerabilities plague all networks, putting precious data, business operations, and brand reputation at risk. One of the best ways to protect your enterprise – big or small − from cyber attacks is to ‘harden’ your operating systems.
What is middleware?
May 24, 2023
Middleware is a buzzword that sounds ominous, but it’s quite the opposite. Middleware is an integral (and cost-effective) component of integration for businesses to build applications more efficiently, manage data, and service their customers.
SIEM implementation guide
May 18, 2023
Businesses spend a lot of time and money staying ahead of threat actors and preventing cyber breaches. Security information and event management (SIEM) can help automate your organisation’s threat detection and incident response.
Types of APIs and their differences
May 10, 2023
Application programming interfaces (APIs) underpin most of what we see or do online. Every time we check the weather on our phone, make an online payment, or use a ridesharing app, we’re using an API. Businesses also rely on APIs to interact with their customers and partners. But the term ‘API’ can refer to many types of services. So, what type of API do you need, and what protocols and standards should they use?
Everything you need to know about the Legion hacking tool
May 03, 2023
The digital world is always changing which means cyber criminals must find new and innovative ways to exploit the internet. A Python-based credential harvester called ‘Legion’ is the latest hacking tool trending on the dark web and Telegram. This hacking tool can exploit various online services including emails and SMS text messages. Here’s what we know about Legion so far.
What is IAM? Identity and access management explained
Apr 26, 2023
It’s crucial for business operations and continuity to have the right people access the right digital resources at the right time and for the right reasons. That’s where identity and access management (IAM) comes in. It follows the principle of least privilege access so that the right job roles (identities) in any organisation get the tools they need to perform their duties without ever compromising on security.
Cyber security analytics guide
Apr 19, 2023
Proactively managing cyber threats is just as crucial to businesses as tracking cash flow, customer acquisition costs, and financial performance. Cyber security analytics can help your organisation detect and respond to cyber threats more quickly and effectively.