Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Global Assets: Navigating the Cybersecurity Landscape with Argo | Part I

In today’s digital age, organizations are often crippled by a cybersecurity environment that is fragmented and complex. The jumble of security data — from intrusion detection systems to vulnerability management platforms and more — scattered and isolated across various tools, hinders a unified approach to security.

Buckle Up: NOAA Predicts "Above-Normal" 2024 Hurricane Season

For businesses operating along the Southern and Eastern Atlantic coast, each hurricane season ushers in a storm front of anxiety and trepidation — in addition to all that wind and rain. And for good reason. According to the National Oceanic and Atmospheric Administration (NOAA), hurricanes are the deadliest and most costly type of weather disaster, responsible for nearly $2.6 trillion in damage since 1980.

Bugcrowd Acquires Informer

It is a proud and exciting day for me to announce that Bugcrowd has acquired Informer. On this momentous day, I can’t help but take a walk down memory lane, thinking about the past decade of hard work and innovation that led us to this moment. Ten years ago, I founded a specialist penetration testing business called The Security Bureau. As our client base grew, certain patterns emerged and it became clear that many organizations were unsure of exactly which assets were internet-facing.

Role-based Access Control vs Attribute-based Access Control: Which to Choose

Access management is a fundamental element of your organization’s security infrastructure. With numerous approaches to implementing an access management system, selecting the most suitable one for your organization may be daunting. In this article, we analyze the two most popular access control models: role-based and attribute-based. We delve into what RBAC and ABAC are, review the pros and cons of each model, compare them, and check if it’s possible to combine them.

An Actionable Guide to OWASP MASVS V2 (+ Practical Examples)

In an era of digital innovation and technological advancements, robust application security has never been more crucial. As cyber threats continue to evolve, organizations must stay ahead of the curve to protect their sensitive data and maintain the security of their users. One project that can help in this process is OWASP (Open Web Application Security Project), a globally recognized non-profit organization dedicated to improving application security.

The Insider Threat Landscape in 2024

Insider threats pose a substantial risk, stemming from the potential misuse of access granted to employees, contractors, and third-party vendors. These threats, which can be both intentional and accidental, threaten the security of sensitive data and can significantly impact an organization’s financial stability, reputation, and operational efficiency.

New Charlotte AI Innovations Enable Prompt Collaboration and Demystify Script Analysis

Since CrowdStrike Charlotte AI became generally available, we’ve seen firsthand how genAI can transform security operations, enabling teams to save hours across time-sensitive tasks and accelerate response to match the speed of modern adversaries.

How to Use the Terraform Destroy Command to Control Cyber Attack Damage

In many cases, cutting something off is necessary to avoid bigger damage. This is the idea behind controlled infrastructure removal, the elimination of some parts of your cloud infrastructure to contain an attack or remove a potential attack surface. It is an important part of infrastructure-as-code (IaC) management and something organizations need to be familiar with as they secure their cloud environments and the apps they develop.