Blogs & Media

Xiph Cyber brings you the latest industry news and views.

Every day a new threat is manufactured, and every day an innovative counter to that threat is created. Our industry moves quickly, and those that can't or won't keep up are fast left behind in high-risk territory.

At Xiph Cyber, our commitment to protecting your privacy and the sovereignty of your data means we invest a lot of time and effort in maintaining up-to-the-minute awareness of the shifts in our industry. You'll find the latest news and our own blogs right here.

Browse categories: Case Studies , Security

Sandbox security defined

Jun 14, 2023

Anyone who’s ever been to a beach will know − sand gets everywhere. It’s the same deal when you code and use programs and web applications that can interfere with the rest of your operating system. Pairing programs or having various developers write code can get messy quickly, putting your operating system and devices at risk. Add potentially risky programs, misconfigured files, or code and things get downright dirty. That’s where sandboxing comes in.

How to get rid of spam emails

Jun 07, 2023

Nearly half of the emails sent worldwide are spam, according to Statista. Spam emails are a pervasive problem clogging up our email boxes and the number one attack vector for phishing attacks, malware, and cyber threats. We explain how to stop spam emails.

System hardening guidelines

May 31, 2023

Vulnerabilities plague all networks, putting precious data, business operations, and brand reputation at risk. One of the best ways to protect your enterprise – big or small − from cyber attacks is to ‘harden’ your operating systems.

What is middleware?

May 24, 2023

Middleware is a buzzword that sounds ominous, but it’s quite the opposite. Middleware is an integral (and cost-effective) component of integration for businesses to build applications more efficiently, manage data, and service their customers.

SIEM implementation guide

May 18, 2023

Businesses spend a lot of time and money staying ahead of threat actors and preventing cyber breaches. Security information and event management (SIEM) can help automate your organisation’s threat detection and incident response.

Types of APIs and their differences

May 10, 2023

Application programming interfaces (APIs) underpin most of what we see or do online. Every time we check the weather on our phone, make an online payment, or use a ridesharing app, we’re using an API. Businesses also rely on APIs to interact with their customers and partners. But the term ‘API’ can refer to many types of services. So, what type of API do you need, and what protocols and standards should they use?

Everything you need to know about the Legion hacking tool

May 03, 2023

The digital world is always changing which means cyber criminals must find new and innovative ways to exploit the internet. A Python-based credential harvester called ‘Legion’ is the latest hacking tool trending on the dark web and Telegram. This hacking tool can exploit various online services including emails and SMS text messages. Here’s what we know about Legion so far.

What is IAM? Identity and access management explained

Apr 26, 2023

It’s crucial for business operations and continuity to have the right people access the right digital resources at the right time and for the right reasons. That’s where identity and access management (IAM) comes in. It follows the principle of least privilege access so that the right job roles (identities) in any organisation get the tools they need to perform their duties without ever compromising on security. 

Cyber security analytics guide

Apr 19, 2023

Proactively managing cyber threats is just as crucial to businesses as tracking cash flow, customer acquisition costs, and financial performance. Cyber security analytics can help your organisation detect and respond to cyber threats more quickly and effectively.

Mobile device security guide

Apr 12, 2023

Mobile devices have a much bigger attack surface than desktops, making them a more significant threat to corporate security. That’s because smartphones, laptops, and tablets are a treasure trove of information. We also use them for personal purposes like doing our online banking, shopping, and sharing personal photos – making them an attractive target to cyber criminals and a double whammy for users. That’s why it’s important to properly secure them.