Security
How hackers bypass 2FA: Insights from Iconis SOC team
Hackers can capture the session cookie by using advanced phishing kits and tools like Evilginx2.
TechForum
Identifying forgotten IT assets for weaponisation
Once at-risk assets are identified, they can be strategically weaponised to enhance security, says Jeffrey Cass, cyber security engineer at ICON Information Systems.
Security
ICONIS: Embracing excellence in information security through ISO 27001
At ICONIS, achieving ISO 27001 certification signifies the establishment of a sophisticated information security management system aligned with leading cyber security frameworks.
Governance risk and compliance
Navigate PCI 4 compliance with ICONIS before 31 March deadline
ICONIS leverages QUALYS solutions to offer clients a proactive pathway to PCI compliance through vulnerability assessments, penetration testing and continuous monitoring.