Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Why Active Directory is your security perimeter

Active Directory (AD), a Microsoft Windows directory service, helps maintain a robust security perimeter within enterprise environments. It helps your business enforce security policies, assign permissions and mitigate security risks within the network. Let’s say your business’s IT infrastructure is a fortress, wherein AD acts as the gatekeeper controlling who enters and what they have access to.

Cloud Sprawl: How to Tidy It Up

Cloud computing offers indisputable benefits, but with the caveat that it can quickly become a disorganized jumble unless adequately managed. It’s common for the average organization to use dozens of cloud instances, solutions, and resources scattered across multiple platforms. Such off-premises services quickly accumulate to accommodate the company’s ever-growing needs. This uncurbed growth, known as cloud sprawl, creates significant economic and security challenges.

Growing Attack Surfaces Highlight the Need for Managed Detection and Response Services

One reason organizations have difficulty defending against cyber threats is their attack surfaces are constantly growing, creating more entry points for bad actors to target. And target they will, creating an onslaught of alerts that drive the need for managed detection and response (MDR) services and other measures to help thwart them. Numerous trends are driving the increase in attack surface, including the proliferation of Internet of Things (IoT) devices.

Integrating your TPRM Stack for Seamless Vendor Lifecycle Management

Every cybersecurity team is being challenged to do more with less. CISOs experience top-down pressure to maximize the value of their resources, consolidate vendors as much as possible, and optimize their tool stack. And, they have unchanged expectations of keeping their organization safe across ever-growing digital supply chains. But traditional approaches to VRM often leave cybersecurity teams grappling with a tangled web of manual processes, disparate tools, and fragmented data.

Building for Cyber Resilience in the Manufacturing Industry

For the third year in a row, manufacturing was the most attacked industry according to IBM X-Force incident response data. Phishing was the top initial infection vector, used in 39% of incidents, and malware was deployed in 45% of attacks. In 2023 alone, manufacturing organizations in the semiconductor, building, automotive, industrial controls systems, boating and consumer packaged goods industries suffered significant attacks.

Measuring the Effectiveness of File Integrity Monitoring Tools

A security incident can be the result of a single unauthorised change. A few may say, 'one change is inconsequential, don't sweat the small stuff.' But when it comes to infrastructure security, the detail is of paramount importance! Just a single edit to a single line item can have a negative effect on an entire file or operating system. It's essential to be made aware of any unauthorised file change and to be made aware with haste.

Understanding Broken Function Level Authorization

Application Programming Interfaces (APIs) allow your applications to talk to one another, like an application-to-application iMessage or Signal. If you’ve ever texted a message to the wrong group chat, you’ve created a situation that mimics what broken function level authentication does between users and applications.

User Guide: PCI 4.0 Requirement 11.6 - Detecting and Responding to Unauthorized Changes on Payment Pages with Feroot

Protecting your e-commerce platform from unauthorized changes and skimming attacks is paramount for maintaining trust and ensuring compliance with PCI DSS 4.0, specifically requirement 11.6. This guide will walk you through utilizing Feroot platform to set up effective monitoring and response mechanisms for your payment pages.

The basics of securing GenAI and LLM development

With the rapid adoption of AI-enabled services into production applications, it’s important that organizations are able to secure the AI/ML components coming into their software supply chain. The good news is that even if you don’t have a tool specifically for scanning models themselves, you can still apply the same DevSecOps best practices to securing model development.

Older, Larger, Riskier: The Correlation Between Application Age and Security Debt in the Public Sector

Years of accumulated security debt due to unaddressed software vulnerabilities and inadequate security configurations plague the applications that support our government functions. The age and size of applications play a significant role in the accumulation of security debt. The State of Software Security 2024 report provides a detailed analysis of how these factors correlate with security vulnerabilities, particularly in older and larger applications.