Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cybersecurity Laws - Get Ready Today to Save Some Money Tomorrow

It looks likely that the UK will join a growing number of nations promoting cybersecurity’s importance for businesses including the introduction of new laws. Amongst the proposals being considered are adding new powers to the UK Cyber Security Council that could significantly change the reporting requirements associated with security incidents. From what has been shared to date, two points that stand out are as follows.

Devo's Use Case-Driven Approach to Accelerate SIEM Time to Value

Organizations cannot wonder if a data breach will happen — they must prepare for when that day comes. Early detection is key to mitigating an attack when it inevitably occurs, but how can CISOs ensure their teams can sift through all the noise they encounter in the SOC to spot malicious activity? Security information and event management (SIEM) technology can play a critical role in empowering your security team to detect potential indicators of compromise faster.

Integrating Cybersecurity Into Your Business's Security Strategy

The way business leaders are constructing their security strategies is transforming. Cybersecurity is at the forefront of modern security operations and must be integrated into any successful overarching security strategy. So how can you better integrate cybersecurity into your business’s general security strategy? Here we’ll explain the ways you can seamlessly integrate digital and physical security to better protect your business.

Are You in Control of Your Personal Information?

Protecting your personal data while participating in an increasingly online community can be challenging. When the wrong people get a hold of personal information, it can lead to identity theft and other costly crimes which can haunt individuals for years. However, consistently applying a few commonsense privacy practices will help you to avoid unnecessary time, expense, and trouble.

SBOM production and secure distribution - Jitsuin and Meterian integration makes it easy.

Jitsuin met Meterian in the NCSC Cyber Runway Accelerator launched in November 2021. What we quickly realized is that automated generation and permissioned sharing of SBOMs would save valuable time in vulnerability discovery and mitigation. So we moved fast to fix things! The integration between Meterian’s Boost Open-Source Software Scanner (BOSS) and Jitsuin’s RKVST SBOM Hub enables software publishers to automatically generate, store and distribute SBOMs in public or private.

Sponsored Post

Under the Sheets, Practical Android Static Analysis

First off, before we get into the technical details of attacking applications, a few housekeeping bits must be understood. This blog is aimed at technical individuals that already understand at a basic level Android development and architecture, aiming to give security testers and application developers an insight into the ways an attacker may interrogate code to achieve some form of compromise.

AT&T Cybersecurity Insights Report: Securing the Edge - Available today

The data is in, the analysis is done, and the eleventh edition of the AT&T Cybersecurity Insights™ Report: Securing the Edge is ready for you! We know cybersecurity is a journey and not a destination, that is why each year we look forward to the publication of this report, a guide to help you on your journey to cybersecurity resiliency.