Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Application Security Engineer: Salary, Skills, Requirements

A recent report suggests that 700,000 new cybersecurity professionals have joined the market since 2020. But still, we are nowhere near closing the talent gap. LinkedIn shows only about +3k people with the "Application Security Engineer" job title. Let's dive into the world of application security.

Why organizations need to embrace new thinking in how they tackle hybrid cloud security challenges

Hybrid cloud computing enables organizations to deploy sensitive workloads on-premise or in a private cloud, while hosting less business-critical resources on public clouds. But despite its many benefits, the hybrid environment also creates security concerns. AlgoSec’s co-founder and CTO, Prof. Avishai Wool shares his expert insights on these concerns and offers best practices to boost hybrid cloud security.

WatchGuard's Firebox M690 Honored at the 2022 CyberSecurity Breakthrough Awards

We are proud to announce the WatchGuard Firebox M690 has been named “Next Generation Firewall Solution of the Year” in the sixth annual CyberSecurity Breakthrough Awards This prestigious awards program recognizes the world’s best information security companies, products and people.

Five worthy reads: Who let the stranger in? Video conferencing attacks

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the evolution of video conferencing since the 2020 pandemic, the security challenges faced by video conferencing tools, how companies and governments have acknowledged the risks, and the best practices to avoid such attacks.

Ransomware - undeniably top of mind

Ransomware’s first documented attack was relatively rudimentary. It was delivered via floppy disk containing a malware program in 1989 that told its victims to pay $189 in ransom to a PO Box in Panama. Today ransomware criminals are significantly more sophisticated, thanks to advances in cyber methods and cryptocurrencies. Not all Ransomware is created equally. Like all malware, malicious codes vary in sophistication and modularity. As such, not all ransomware codes are made the same.

Social Engineering and VPN Access: The Making of a Modern Breach

In what seems to be a constant drip of headlines about large enterprises experiencing security incidents, the world most recently learned of a successful data infiltration of rideshare and delivery company Uber. In a blog update, Uber attributed the attack to the infamous Lapsus$ group that has made a name for itself over the past year with successful breaches of household names including Microsoft, Rockstar Games, Samsung, Nvidia, Ubisoft, and Okta.

How is AI bias contained in Identity Verification Solutions?

In the context of digital onboarding, demographic features such as ethnicity, age, gender, socioeconomic circumstances, and even camera/device quality might affect the software’s capacity to match one face to a database of faces i.e. AI Bias. The quality and resilience of the underlying database in various sorts of surveillance might feed bias in the AI models. Biometrics are used in modern face recognition software to map facial traits from an image or video.

How to Improve Your Security Posture

All modern businesses must be prepared for a cyberattack. Cybercriminals can target your website, email network, API, or even your physical server — so is your security posture robust enough to withstand a sustained or advanced cyberattack? According to the Hiscox Cyber Readiness Report 2022, business cyber readiness scores have fallen by 2.6% over the last year. Mostly, this stems from a cybersecurity staff shortage, as well as declining governance and assurance.