Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Is Security Posture?

Security posture refers to the overall strength of an organization’s cybersecurity. It measures how an organization’s mechanisms, policies, procedures and operations respond to and defend against cyber threats. Continue reading to learn more about security posture, why your organization’s security posture is important, how to assess it and how to improve it.

The global threat evolution of internet-exposed OT/ICS

Operational technology (OT) and Industrial Control Systems (ICS) are core parts of an engine fueling critical infrastructure in industrialized nations worldwide. Water treatment facilities. Wastewater plants. Electrical transmission and distribution hubs. Nuclear power and manufacturing plants. Energy pipelines.

Ask Sage's Nicolas Chaillan on moving the DOD to zero trust and deploying Kubernetes in space

In this week’s episode of The Future of Security Operations podcast, I'm joined by Nicolas Chaillan. Nicolas is a security leader who has held several high-profile roles in US federal agencies including Chief Software Officer for the US Air Force and Space Force, Special Advisor for Cloud Security and DevSecOps at the Department of Defense (DOD), and Special Advisor for Cybersecurity and Chief Architect for Cyber.gov at the Department of Homeland Security.

Enhancing Developer Efficiency With AI-Powered Remediation

Traditional methods of flaw remediation are not equipped with the technology to keep pace with the rapid evolution of code generation practices, leaving developers incapable of managing burdensome and overwhelming security debt. Code security is still a critical concern in software development. For instance, when GitHub Copilot generated 435 code snippets, almost 36% of them had security weaknesses, regardless of the programming language.

What is the EU Cyber Solidarity Act?

The EU Cyber Solidarity Act is a new initiative that follows the European Union's latest efforts to build stronger cyber defenses against evolving cybersecurity threats. This legislation introduces a new strategy for enhanced cooperation between EU member states and focuses on how EU nations can better prepare and respond to cyber incidents.

TrustCloud's New Hallucination-Proof GraphAI Shaves Hours Off Security Questionnaires

TrustCloud’s AI already pre-fills up to 80% of a security questionnaire, but we’ve developed the next iteration. TrustShare has built new generative AI capabilities called GraphAI. GraphAI will still find the right answer for a security questionnaire topic, but now it will better account for context and generate more natural, accurate responses based on your program controls. GraphAI is built on a retrieval-augmented generative (RAG) model on our large language model (LLM).

USPS Surges to Take Top Spot as Most Impersonated Brand in Phishing Attacks

New data shows phishing attacks are deviating from the traditional focus on technology and retail sectors and are opting for alternate brands with widespread appeal. I’ve covered plenty of reports about brand impersonation and it’s almost always Microsoft on top of the list. And with good reason: access to a Microsoft 365 account can give attackers a foothold and potential access to data, applications and more.

Unveiling Sharp Stealer: A New Threat to Gamers

In the ever-evolving landscape of cybersecurity threats, the recent breach by the notorious hacker group R00TK1T serves as a stark reminder of the vulnerabilities faced by even the most established organizations. As the Foresight Threat Team delves into the details of this alarming incident, it becomes imperative to shed light on the implications and lessons to be learned from this breach.

Centripetal and 4Data: A Powerful Union for Intelligence Powered Cybersecurity

In the ever-evolving cybersecurity landscape, staying ahead of threats is not just a priority but a necessity. Today, we’re announcing a strategic partnership with 4Data Solutions, a renowned technology solutions provider. This alliance is poised to redefine cybersecurity solutions across the UK while elevating the standards of protection for businesses worldwide.