Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

How to choose the right penetration testing partner for your business

In today’s digital landscape, cybersecurity threats are evolving at an alarming rate. With the growing number of cyber-attacks and data breaches, businesses must prioritise their security measures to protect sensitive information and safeguard their reputation. Penetration testing is an essential component of this defence strategy.

New Research Identifies Oversight Practices Correlated With Effective Cybersecurity Outcomes

In the last few years, boards have rushed to incorporate Cyber Risk into the Board’s overall risk management duty, without really knowing how effective those efforts have been. For the first time ever, Diligent and Bitsight have partnered to see just how well the effort at the board level is translating into reducing Cyber Risk for their company.

The Growing Importance of CAASM in Company Cybersecurity Strategy

The recent years' events, including the proliferation of ransomware, the pandemic, and political tensions, have fast-tracked the development of both offensive and defensive tools in the cyber domain. Cybersecurity concepts that were nascent a few years ago are now being refined, demonstrating the practical benefits of modern digital risk management strategies.

What is a Software Bill of Material? SBOM and Supply Chain Security

SBOM and supply chain security help organizations stay on top of their information security and comply with regulations. In this regard, the SBOM (software bill of materials) can be an instrumentation. Meanwhile, the continually changing digital environment with cyber threats lurking in every corner, as well as the possibility of vulnerabilities, can lead to disasters; knowing the importance of software bill of materials (SBOM) is significant.

What is Azure IoT Security? Top Best Practices to Secure IoT Devices

IoT devices have become a vital component of worldwide business operations for different industries, including healthcare, IT, transportation, etc. Organizations that invest in IoT deliver more value to their consumers than others. According to a report by Statista, the number of IoT devices is estimated to be 17.08 billion in 2024, and the figure is showing no signs of stopping. But as its usage is continuously increasing, so are the security concerns!

Spoutible Enhances Platform Security through Partnership with Wallarm

Spoutible, the rapidly growing social media platform known for its commitment to fostering a safe, inclusive, and respectful online community, has taken a significant step forward in its mission to ensure user safety, security and data integrity. Recognizing the critical importance of robust API security in today’s digital age, Spoutible is excited to announce a strategic partnership with Wallarm, a leader in API and Application security.

How Safe Are Apps on The App Store?

The wonderful world of apps can make our lives, work, and studies significantly easier. Our phones, tablets, or computers have many apps, ranging from photography, self-help, fitness, social media, and video games. However, some mobile apps are more safe than others. Although the app store rigorously tests its apps to ensure they function correctly and are free from harmful software, some third-party apps can still sneak onto the platform that can steal user data or harm their devices.

What is Cloud Identity Management?

As businesses embrace remote work and the transformation to the cloud, the need for robust identity management is key. But what exactly is cloud identity management, and why is it critical? Essentially, cloud identity management orchestrates identity and access management (IAM) in cloud environments and supports the shifting of authentication and authorization processes to the cloud.

Implementing phishing-resistant MFA: Our data-driven approach

Multi-factor authentication (MFA) is widely recognized as an important control to make our accounts more secure by providing protection beyond just passwords. When MFA is enabled, we tend to think our accounts are safe from unauthorized access — but what if we said it's time to rethink this belief?

AI Platforms Name Cybersecurity Threats and Advice for 2024

With $109.5 billion of growth expected between now and 2030, the global AI cybersecurity market is booming – and it's not hard to see why. According to a recent survey of security professionals, three-quarters (75%) have observed an increase in cyberattacks. Of these, the research found that an even greater proportion (an overwhelming 85%) blamed AI.

Browser Security in 2024: Technologies and Trends

Browser security is a set of measures and processes intended to protect users and their data when using web browsers. This includes mechanisms to prevent unauthorized access, safeguard against malicious software and other browser security threats, and ways to protect the privacy of online activities.