Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Automated phishing triage with Material and Tines

At Tines, we understand there’s no such thing as a universal workflow. While there are often some standard best practices, whether carrying out a workflow manually or automating it, every team has a unique approach and set of tools to solve challenges. This is especially true for security teams, who constantly have to evolve their processes and infrastructure to stay ahead of cyber attackers in today’s rapidly changing threat landscape.

10 Tips to Mitigate Your SaaS Cybersecurity Risks

Convenience. This is the key reason that businesses rely on SaaS applications. Companies worldwide were using an average number of 110 SaaS applications. All those applications have become one of the most severe security challenges. A report states that 40% of SaaS assets are vulnerable to data leaks due to poor management. SaaS-based apps are prone to massive threats, including ransomware, phishing, and malware. Even minor security incidents have damaging effects on your enterprise.

"Easy" button for cloud NDR visibility

As organizations continue to rapidly adopt cloud services, they struggle to expand network detection and response (NDR) capabilities to their hybrid and multi-cloud environments. Network visibility is critical for security operations center (SOC) teams to secure their cloud environments and ensure they can elevate threat detection and incident investigation capabilities. However, traditional NDR solutions require management, configuration and often lack the security context needed.

What is FIPS 140-2?

Encryption is an important security tool for protecting sensitive data. However, not all solutions used the same cipher techniques. There are a number of encryption algorithms that can be used to secure data with varying levels of security. To set acceptable standards for encryption technologies used by the U.S. Government the National Institute of Standards and Technology (NIST) has published the Federal Information Processing Standards (FIPS) series. These standards define how U.S.

Halloween feature: Cheat codes for Cybersecurity and preventing kids from being "tricked"

October and Halloween are both fun and scary, just like cyberspace. Cyber Security Awareness Month is an excellent time for grown-ups to discuss cyber safety with us. It takes an informed cyber village to help raise savvy cyber kids, and I believe introducing cyber literacy to kids of all ages is increasingly critical. Today, every household is filled with connected devices, and I hope this information will help with better digital decision-making by kids.

DevOps-Centric Security is Finally Here | Announcing JFrog Advanced Security

Today marks an exciting day for JFrog and a substantial step forward towards ensuring end-to-end software supply chain security. JFrog Advanced Security is our unique approach for DevOps-centric security, and the only solution that was built especially for today’s modern DevOps workflows.

Infographic: Building the future of Digital Onboarding across platforms

Customers and regulators are increasingly scrutinizing your Digital Onboarding procedure, and fraudsters are becoming more sophisticated. Verifying your online consumers’ real-life identities is an increasing problem and requirement for organizations across industries.

Five Steps Towards Building a Better Data Security Strategy

In the past when organizations had a new security need, they would meet that need by purchasing a new security product. But that approach is how we ended up with an average of 76 security tools per enterprise, according to a 2021 survey from Panaseer. You may have a lot of tools, but that doesn’t mean your information is protected.

Phishing Scams Have Reached New Heights: How to Improve Detection and Response

The Anti-Phishing Working Group (APWG) Phishing Activity Trends Report reveals that in Q2 of 2022 there were 1,097,811 total phishing attacks. This marks the worst quarter for phishing observed to date, exceeding Q1 of 2022 which was the first time the three-month total exceeded one million.