Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

How To Achieve Vulnerability Remediation

Vulnerabilities are a major risk for organizations, and a major attack vector for threat actors. There were over 29,000 vulnerabilities published in 2023, amounting to over 3,800 more common vulnerabilities and exposure (CVEs) identifiers being issued last year than in 2022. But that doesn’t mean these most recent vulnerabilities are the only ones in a threat actor’s toolbox.

Cybersecurity Awareness: Protecting Your Profile from Online Threats

Have you ever considered how vulnerable your online profile might be to cyber threats? A study by the University of Maryland showed that hackers attack at least every 39 seconds. From the moment you log into your social media accounts to the instant you make an online purchase, you're constantly at risk of falling victim to cyberattacks. The big question is: is there a way to prevent this from happening?

The 7 Essential Components for ASPM (Application Security Posture Management)

As attack vectors expand due to architectural changes, such as distributed cloud deployment, APIs, and multiple access mechanisms, modern apps are under increasing threat. Additionally, with an ever-growing feature set, rapid release cycles, and dependency on third-party libraries, security is impacted at every application stage of the SDLC. Application-layer attacks have spiked by as much as 80% in 2023.

Jit Announces Open Source License Detection and Tracking

Earlier this year Jit announced Software Bill of Materials, which catalogs every open source component in your codebase – making it easy to understand if you are using an open source component that is impacted by a newly disclosed security vulnerability. With our new release of Open Source License Detection, you’ll also be able to detect the associated license of each open source component in your codebase.

AI: The Future Shield Against Evolving Security Threats | Explore with Brivo

In an era where security threats are becoming more sophisticated, the role of Artificial Intelligence (AI) in safeguarding businesses has never been more critical. Join us, Brivo, as we delve into the transformative power of AI in the realm of security. Discover how AI technologies are not just a part of the future but a necessity in today's rapidly changing security landscape. From predictive analytics to real-time monitoring, learn how AI is revolutionizing the way we protect our spaces and ensure safety. 🚀

Third-Party Risk: How MDR Offers Relief as Security Threats Abound

While third-party products and services are crucial to everyday business operations for almost any company, they also present significant security concerns, as high-profile attacks including SolarWinds and MOVEit laid bare. Trustwave research shows the attacks vary by industry but also makes clear the best defense is the stringent application of the latest security measures, including penetration tests, vulnerability scans, and managed detection and response (MDR) services.

Friday Flows Episode 23: Retrieve and respond to Azure guest accounts detected by Wiz

"This is a great example of the power of Tines. You can automate something simple, but also very manual & time-consuming." Michael Tolan continues our cloud security series & walks us through a workflow to easily identify and manage Azure Entra ID guest accounts detected by Wiz. In seconds, take action by disabling or deleting any undesired guest accounts via a Tines page.

The Looming Cyber Threat in Real Estate

In our interconnected world, the real estate industry has embraced technology to revolutionize its operations, enhance customer experiences, and streamline business processes. Yet, while this technological evolution has brought immense benefits to the property sector, it has also attracted the attention of nefarious actors keen on exploiting vulnerabilities.

What is anti-tampering protection and how can it help a company's cybersecurity?

Cybercriminals are increasingly using new evasion strategies in their attacks in order to disable or alter company security controls. This year, there has been a surge in the use of hunter-killer malware that seeks to identify and eliminate enterprise defenses such as firewalls, antivirus, and next-generation EDR technologies. A recent report reveals a massive 333% increase in this type of malware.

Evaluating Your Security Posture: Security Assessment Basics

This is Part 4 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here. Performing Security Assessments is one component of security operations that every organization does, or at least should do. However, deciding what type of assessment to conduct can be challenging. After all, there’s a long list of assessments that can be useful in providing insights into your security architecture and operational performance.