Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Bringing Veracode Fix to GitHub

If you’re an avid reader of Application Security surveys, analyst papers, or incident reports, you may have concluded that the biggest issue most organizations have with application security is NOT finding the flaws in their codebase, but is, in fact, finding ways to remediate them while also creating new applications and updates, oh and keeping the lights on. Many organizations are drowning in security debt.

Identity Under Siege: Responding to the National Public Data Breach

While the scale of this data breach is alarming – with 277 gigabytes of data reportedly stolen – it’s important not to panic. Instead, focus on taking concrete steps to protect yourself. Stay informed, be proactive in safeguarding your personal information, and remain vigilant for any signs of suspicious activity.

The Rise of ZTNA: A Seamless Path to Remote Access

Working remotely using cloud applications is now the norm for getting things done. But while these shifts offer greater flexibility, they also bring new security challenges. For years, virtual private networks (VPNs) were the go-to solution for securing remote access. But when used at such a large scale, VPNs are inefficient, slowing users down and undoing the productivity gains that come along with remote work. Worse, they expose organizations to unnecessary security risks like lateral movement attacks.

Top Privileged Access Management (PAM) Solutions for Secure Access

The privileged accounts in your IT environment require special attention because they have elevated access to vital systems and sensitive data. The organization can suffer severe damage if they are misused by their owners or compromised in attacks. In addition, many compliance standards require organizations to maintain tight control over privileged access. Most organizations have hundreds or thousands of accounts with privileged access.

How Do You Know if Your SSN Is Being Used?

To find out if someone else is using your Social Security number (SSN), you should check your credit reports, review your mySocialSecurity account and be cautious of calls from debt collectors. The idea of a stranger having such sensitive information about your identity can be terrifying. You may even be a victim of the recent data breach in which over 2.9 billion pieces of personal data were stolen from National Public Data.

ISO 27001 - 2013 vs 2022: Changes, Transition & More

Information and digital security frameworks like FedRAMP, CMMC, and ISO 27001 are not static documents. They provide a static framework for your business to comply with and achieve, but that framework is only valid for so long. Several different forces are in play to ensure that the stipulations and security measures outlined in these frameworks remain valid over time.

Australia Enacts Landmark Cybersecurity Legislation: The Cyber Security Bill 2024

On October 9, 2024, the Australian government took a significant step in fortifying its cyber defenses by introducing the Cyber Security Bill 2024 to Parliament. This pioneering legislation marks the country's first standalone cybersecurity law, designed to enhance protections for both citizens and organizations amid escalating geopolitical and cyber threats. By implementing comprehensive measures, Australia aims to safeguard critical infrastructure and ensure a more secure digital environment.

Understanding Common Ports Used in Networks for TCP and UDP Usage

Think of a port as a virtual gateway that a specific service, process, or application on your computer uses for network communication. Each port is assigned a unique number, allowing different types of traffic to be directed to the appropriate software. For example, your email might use one port, while your web browsing uses another. When combined with an IP address, a port number creates a complete socket address, enabling precise routing of data to and from your computer across the network.

Trinity Ransomware Targets the Healthcare Sector

The Trinity ransomware gang is launching double-extortion attacks against organizations in the healthcare sector, according to an advisory from the US Department of Health and Human Services (HHS). The ransomware gains initial access via phishing emails or software vulnerabilities. “Trinity ransomware was first seen around May 2024,” the advisory says.

Patient Data Security in Healthcare Marketing: A Critical Necessity

Nowadays, patient engagement through online tools forms an important part of healthcare marketing. The use of digital channels to reach out to patients requires that patient data security be considered with the seriousness it deserves. Healthcare providers have access to critical personal information. Hence, protecting this data is a basic tenet that goes beyond just being a legal requirement. More so because trust between them and their patients has to be cemented.