Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Symmetric vs. asymmetric encryption: Practical Python examples

Symmetric and asymmetric encryption are the two most common ways to protect sensitive data with cryptography. These methods use key(s) to transform an unencrypted message into an encrypted message (a ciphertext) that is extremely difficult to decrypt without the correct key(s). Symmetric encryption uses a single key to encrypt and decrypt data. In contrast, asymmetric encryption uses a pair of keys, a public and private key, to encrypt and decrypt sensitive data.

Compliance, collaboration, and communication: The benefits of NIST CSF 2.0

As regulatory mandates and frameworks continue to emerge, cybersecurity leaders must continue to adapt to more than just the latest threat actor tactics, techniques, and procedures. As part of our ongoing webinar series centered on compliance, SecurityScorecard’s Senior Product Marketing Manager, Devaney Devoe, moderated a discussion with Adam Bixler (Principal, Squadra Ventures), Christopher Strand (SecurityScorecard’s Global Risk Officer), and Steve Cobb (CISO, SecurityScorecard).

Strengthening Software Supply Chain Security: Insights from RSA Conference 2024

It’s a wrap! RSA 2024 brought together cybersecurity experts, industry leaders, and innovators to delve into critical topics defining the future of digital security. One of the key themes that garnered significant attention at RSA 2024 was software supply chain security.

Offensive Security Services: How to Improve Security by Thinking Like an Adversary

Taking a proactive approach to cybersecurity is essential for safeguarding sensitive data and systems from potential threats. By adopting an offensive security strategy, organizations can identify and mitigate vulnerabilities and risks before they are exploited by malicious actors.

Seattle Kraken Deploy WatchGuard's Unified Security Platform

We’re proud to announce the recent deployment of our Unified Security Platform architecture for the Seattle Kraken, providing comprehensive protection against cyber threats for the NHL’s 32nd franchise. The Kraken now rely on WatchGuard to provide complete protection for their organization as the official cybersecurity sponsor of the Seattle Kraken.

Part 1: How Egnyte Built its Turnkey Retrieval Augmented Generation Solution

The Egnyte platform houses a lot of data. To enable users to make the most of this asset, we need to help them efficiently retrieve information. Traditional search interfaces do a decent job of retrieving information directly related to query keywords, often presenting results in a list format without additional interpretation or synthesis.

NVD Update: More Problems, More Letters, Some Questions Answered

The past week has been a wild ride for those following all the hot goss’ on the National Vulnerability Database. Previously on The Code and the Vulnerable, we reported on the NVD slowdown that began in mid February. Since then, the NVD has been adding new CVEs, but has only enriched (with important information like CVSS and CPE) a very small fraction of them. If you need a breakdown of all these acronyms, definitely check out that first blog on this topic.

AI, Platforms, Zero Trust, and Other Topics That Dominated RSA Conference 2024

Every year there’s quite a bit happening at the RSA Conference and no matter how hard you try, it can be difficult to take it all in. Between a sprawling showfloor with hundreds of vendors vying for attention, speaking sessions with experts from across the industry, private meetings with customers and prospects, plus social events in the evening, it’s understandable that you can come away with a bit of sensory overload.