Blog

The latest news and developments

Explore a blend of security news, industry developments, and in-depth technical analysis of our services on Secora Consulting's blog. Bookmark this page to stay informed.

Latest Blogs and News

Secora Consulting’s blog is a mixture of news and developments in the security world and technical breakdowns of our services. Bookmark this page to stay informed.

News

Navigating the Aftermath of the Okta Data Breach

In the rapidly evolving landscape of cybersecurity, even leading companies are not immune to data breaches. A recent incident involving Okta, a prominent identity and access management company, highlights this reality. This blog post aims to provide a comprehensive overview of the Okta data breach that occurred in October 2023, detailing the events, the impact on users, and crucial steps for those affected to mitigate risks. Summary of What Has Happened In October 2023, Okta disclosed a significant security breach in its customer support management system, commonly known as the Okta Help Center.

GRC

The Path to Operational Resilience Key Considerations for Credit Unions

In a time where business disruptions and cybersecurity incidents are inevitable, operational resilience has become a prominent focus area for the Central Bank of Ireland (CBI). As a result, the CBI released Cross Industry Guidance on Operational Resilience in December 2021 and has given those in the financial services sector a maximum of two years to implement their guidance. By December 2023, all financial institutions will need to be able to demonstrate that their operational resilience strategies are aligned to the guidance.

News

Secora Consulting achieves ISO 27001:2017 and ISO 9001:2015 certification

Secora Consulting is proud to announce that we have successfully achieved ISO 27001:2017 and ISO 9001:2015 certification, reaffirming our commitment to quality and security management in our operations. What is ISO 27001? ISO 27001 is an internationally recognised standard which sets out the requirements for establishing, implementing and maintaining an Information Security Management System (ISMS). The aim of this is to help businesses keep one of their most critical assets, their information, secure.

GRC

ISO 27001 - 7 reasons why organisations are certifying to the standard

ISO 27001 (ISO/IEC 27001:2017) is an internationally recognised and widely adopted standard which outlines best practices and requirements for an organisation’s Information Security Management System (ISMS). The ISMS is designed to preserve the confidentiality, integrity and availability of information by applying a risk management process with the aim of assisting organisations in keeping their information secure. In other words, the standard assists in helping organisations protect their sensitive information including customer information, financial data and intellectual property from unauthorised access.

Testing

Going Mobile: The importance of Mobile Application Testing

Managing attack surfaces is no easy task - you can’t protect what you don’t know you have. Many businesses have their own stories of a pseudo-mythological Windows XP box that sits in the corner and makes everything run. But one of the areas that often escapes testing is our mobile apps. With more and more businesses bringing their services on the go, we take a look at why mobile application testing is important, and what Secora commonly identifies when testing.

Testing

External and Internal Testing: Whats the Difference

Securing your organisation using policies and technical controls is critical; however, unless these controls and policies are regularly tested, an organisation cannot determine or monitor their effectiveness. It seems as though every week there is a new cyber attack reported that may affect just one organisation or multiple organisations simultaneously. The importance of penetration testing Building strong security controls and processes is essential to building effective defences. By engaging in Penetration testing , you can test and improve the controls and processes you already have in place to help build an effective and strong defence-in-depth cybersecurity posture.