Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Webinar: Outsourced Cybersecurity or In-House? How to Choose the Best Approach for Your Organization

The coronavirus pandemic created new challenges for businesses as they adapt to an operating model in which working from home has become the ‘new normal. In addition, threat actors constantly change their strategies, tools, and techniques. When their attacks become less effective, they look for new weaknesses to expose and move to.

Building trust in a Zero-Trust security environment

Despite years of industry efforts to combat insider threats, malicious behavior can still sometimes be difficult to identify. As organizations work towards building a corporate cyber security culture, many have begun looking into zero-trust architectures to cover as many attack surfaces as possible. This action is a step in the right direction, but it also has the potential to raise fears and generate negative responses from employees.

Forward Networks Recognized For Excellence In Customer Service

Forward Networks is a winner in the 2022 Business Insights Excellence in Customer Service Awards. We are over the moon — because our customers are our top priority. Our platform addresses unprecedented network complexity by collecting configuration and state data for all devices in the network and indexing it in a vendor-agnostic way.

Gartner's top security threat and pentesting vs continuous scans - what you missed from Hack Yourself Stockholm 2021

Included by Gartner in 2021 as a major cybersecurity category and an emerging product, the External Attack Surface Management (EASM) term might be new. Still, the idea behind it is nothing new: identifying risks coming from internet-facing assets that an organization may be unaware of. A few companies, including Detectify, have been highlighting the importance of the attack surface and understanding the potential risks of the constantly-changing environment.

Tech tales: Achieving PCI compliance with application security testing

In our new tech tales series, we discuss how Synopsys customers use our products and services to uncover security risks in their organization. Synopsys customers span every industry—from small to large enterprises across financial services, automotive, public sector, medical and healthcare, and much more. One thing they all have in common is building trust into their software.

Best Practices for Securing Wireless Networks

Most organizations employ mobile computing, which utilizes wireless communications for staff members to perform day-to-day tasks with more ease. While some organizations have deployed enterprise security standards on their wireless networks, Trustwave SpiderLabs has observed some organizations deviating from security best practices when it comes to managing a wireless environment leaving these wireless networks as low-hanging fruit for attackers to abuse.

What is a spoofing attack? Types of spoofing and prevention measures

Spoofing attacks are on the rise. What is a spoofing attack, you ask? Essentially, it attempts to gain unauthorised access to systems, devices or networks by masquerading as a valid user. In other words, spoofing attackers try to mimic or copy the behaviour of authorised users to steal information or gain access.

A peek behind the BPFDoor

Threats knock on your door all the time. In this research piece, we explore BPFDoor — a backdoor payload specifically crafted for Linux in order to gain re-entry into a previously or actively compromised target environment. This payload has been observed across systems for five years, suggesting that the threat actors responsible for operating the malware have been around for some time and have likely operated undetected in many environments.

JFrog & Industry Leaders Join White House Summit on Open Source Software Security

There’s no question the volume, sophistication and severity of software supply chain attacks has increased in the last year. In recent months the JFrog Security Research team tracked nearly 20 different open source software supply chain attacks – two of which were zero day threats.