Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

3 Critical Cybersecurity Gaps Affecting GovCons

Government contractors handling Controlled Unclassified Information (CUI) for the Department of Defense must navigate complex compliance requirements. Central to these requirements is the Cybersecurity Maturity Model Certification (CMMC), which mandates conformance to NIST SP 800-171 and DFARS 252. This framework encompasses 110 security requirements across 14 security domains, including Access Control, Audit and Accountability, Risk Assessment, Incident Response, and several others.

Now Available: Evidence Collection with JFrog

There is an increasing need for traceability and attestation of the actions taken as software moves across the SDLC. Emerging regulations and policies around secure software development are rapidly evolving, and it’s important to stay ahead of the changing landscape. Some organizations have taken a proactive approach with home-grown solutions or manual processes, but despite best efforts, these solutions often lack scale and eventually falter over time.

Top Challenges in Mobile Application Security Testing (+ Solutions)

Mobile app security testing identifies and assesses security vulnerabilities in mobile applications, including Android and iOS. It is a part of a more extensive security assessment or penetration test encompassing the client-server architecture and server-side APIs used by the mobile app. Mobile app security testing (MAST) is an afterthought since organizations want to release their apps faster, and development teams are understaffed and overworked. The result?

2025: Zenity's Journey to Securing the Most Transformative IT Wave of Our Time

2024 was a year unlike any other—a year of transformation, resilience, and immense progress. Despite the challenges our team faced, including the impact of the war in Israel, we stood strong, united by our mission to secure AI Agents everywhere, and focusing on providing impactful value to our customers and partners. Together, we laid the foundation for the next wave of innovation, enabling enterprises to embrace this revolutionary technology with confidence and security.

Sergey Tokarev: Businesses Lessons Transformed into AI Lessons

AI implementation can enhance business processes and help manage different tasks to save time and effort. AI has become a part of everyday life; yet many people have not learned to use it properly to benefit from it. Sergey Tokarev, the co-founder and partner at Roosh Ventures, commented on business errors and shared valuable solutions to advance AI for business.

Exploring the Ethical Side of Immediate Edge in Trading

The world of trading has undergone a significant transformation with the advent of automated trading platforms like Immediate Edge, where Immediate's AI trading bot promises users the ability to trade cryptocurrencies and other assets with minimal effort. These platforms are leveraging sophisticated algorithms to maximize profits. However, as with any technological advancement, the ethical implications of using such platforms, particularly Immediate Edge, warrant careful consideration. This exploration delves into the ethical dimensions of Immediate Edge, examining its impact on traders, markets, and society at large.

Ransomware Attacks on CRMs: Why They're Growing and How to Stop Them

Keeping data and operations streamlined is why CRM systems are an essential part of business. However, as they are used more and more, they have become a prime target of ransomware attacks that can threaten the availability of sensitive customer data, as well as business operations.

Regulatory Readiness & Resilience with Kris Lovejoy, Global Security Leader at Kyndryl

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

Foundation of Modern Cyber Defense: Building Resilient Security Frameworks | IdentityShield Summit

Lokesh Singh Rajawat, Senior Software Engineer at miniOrange, delivers an engaging session on establishing foundational cybersecurity practices. Gain insights into crafting resilient security frameworks that serve as the cornerstone of modern cyber defense strategies, protecting against evolving threats in today’s digital landscape.

#187 - Automation in MSSP Operations with David Burkett, Cloud Security Researcher at Corelight

On this episode of The Cybersecurity Defenders Podcast we talk about automation in MSSP operations with David Burkett, Cloud Security Researcher at Core light. David has deep expertise in cloud threat detection and automation. Over the course of his career, David has built and optimized three different Cyber Security Operations Centers for MSSP and MDR providers, demonstrating his unparalleled skill in scaling security operations through automation and efficient processes.