Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Oracle SBC: Multiple Security Vulnerabilities Leading to Unauthorized Access and Denial of Service

Oracle Communications Session Border Controller (SBC) is one of the most popular products worldwide that helps service providers deliver trusted, carrier-grade, real-time communications such as VoLTE, VoIP, video conferencing and calling, presence, IM, and IPTV. Harold Zang, Senior Technical Security Specialist and Jeremy Nunn, Security Specialist at Trustwave SpiderLabs, identified three vulnerabilities in the Oracle SBC.

User Experience Matters: Ending the Tug of War Between Security and Performance

Security leaders often question why performance matters. In this blog, we will discuss the “tug of war” that exists between implementing robust security controls and delivering a superior user experience as we spotlight the findings from a new white paper from industry analyst IDC, and highlight why the design of the Netskope NewEdge infrastructure is so important to how we approach these challenges.

Why You Should Get Started with the Rego Policy Language

The Rego policy language is the backbone of Open Policy Agent (OPA), the policy enforcement tool that helps simplify cloud-native development at scale. With OPA Rego policy, the result is a reduced manual authorization burden, improved accuracy, and quicker time to market. But yes, there’s a learning curve, which makes Rego a main barrier to using OPA. You might be hesitant about the time investment needed to learn a new, highly specified language.

When prevention isn't better than cure

Learn to protect data from ransomware Explore real-life cybercrime examples Dive into the future of data security Learn to protect data from ransomware Register Now About half of CISOs say that their organisation is unprepared to cope with a coordinated attack. So they’re investing heavily to manage the risk. Deloitte reported that firms spend over 10% of their annual IT budget on cybersecurity. That works out at about $2-5 million per year for a typical enterprise.

MSSPs: Streamline your customers' operations with Tines

Today, MSSPs are trying to scale their businesses quickly, onboard customers with high-quality tool sets that evolve with the company, and maintain or increase margins. This means reducing costs, improving onboarding time, and building the next generation of MSSP (Managed Security Service Provider) or MDR (Managed Detection and Response) company. Threats in their own and customer environments continue to grow for MSSPs, as does the technology stack to support them.

Cybersecurity Expert Interview: Jonathan Haas

Introduce yourself and tell us what you and your company does. My name's Jonathan Haas, I'm the CEO and co-founder of ThreatKey. ThreatKey is a security posture management platform. Essentially, what that means is we help businesses secure themselves and identify which things they should be prioritizing amongst their various business tools. Things like AWS, GCP, or SaaS product like Google workspace, Microsoft 365 65, etc.

Trustwave Government Solutions' Cybersecurity Glossary

Cybersecurity is just a word, but that word is the entry way into an incredibly complex world filled with an alphabet soup-level of acronyms, connected to thousands of terms that help define the category. To help make it easier to understand the latest terminology to better your knowledge of what is happening in the cyber world, Trustwave Government Solutions has created a handy online glossary.

5 Things We Learned from The Definitive Guide to Data Loss Prevention (DLP)

In the context of hybrid work, the threat of data loss is rampant. Cybersecurity systems that were once designed to operate within the confines of a network perimeter have become obsolete, with employees using various devices, networks, and applications to get their work done. As such, it’s easier than ever for companies to be vulnerable to the loss of sensitive data. So, what’s the solution? Recently, Digital Guardian published The Definitive Guide to DLP: 2021 Hybrid Work Edition.

Privacy in Q2 2022: US, Canada, and the UK

The second quarter of 2022 offered plenty of positing on privacy, both in the U.S. and internationally. In the U.S., we saw the addition of another state privacy law, and a spark of hope in privacy professionals’ eyes with the introduction of tangible federal legislation. Plus, the Federal Trade Commission (FTC) is positioned to act on rulemaking like never before.

How to Implement an Enterprise Risk Management Framework

Managing individual business risks is difficult when silos exist. An enterprise risk management (ERM) framework consolidates risk management strategy across an entire organization, enabling better visibility, measurement, and management of business objectives. With a unified focus on addressing risk, compliance teams can universally improve regulatory compliance, governance, and risk management processes.