Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Sponsored Post

OWASP ASVS with your security testing tools

OWASP ASVS is a great project to provide a framework of security controls for design and define the basis of secure development. But the problem is when you decide to use these checks in your organization, you end up with a 71-page pdf file or an OWASP ASVS checklist (excel sheet). It is incredibly hard for organizations to adapt and spread the word within the company. This is why we decided to implement a feature that gets all the security testing tools results (by CWE) and maps them into OWASP ASVS automatically so you can use it in every aspect of your application security program.

E-commerce Fraud: A Digital Dilemma

The digital revolution, while bringing about unprecedented convenience and opportunities, has also opened the floodgates to a new wave of threats. E-commerce fraud and account takeover fraud are two such threats that have become increasingly prevalent in recent years. In the face of these challenges, fraud detection software has emerged as a critical tool in the fight against online fraud. This article will explore the role of fraud detection software in combating e-commerce fraud and account takeover fraud.

The Five Pillars of Cloud Security

As more employees move to remote work, more of today’s business environment is shifting towards the cloud. Indeed, approximately 90% of companies use at least one cloud-based service. While it brings great benefits, the cloud also brings challenges, including properly securing cloud-based assets. Cybercriminals are well-versed in corporate cloud usage and are successfully exploiting that knowledge. In the past year and a half, nearly 80% of companies suffered a cloud-based data breach.

NIS2 Directive and cyber risk management

The NIS2 Directive, published in December 2022, sets out a series of measures for improving cyber risk management throughout the European Union. All EU member states must apply the Directive as part of national law by October 2024. By the same date, all applicable organizations must comply with the measures set out in NIS2.

Using Mitre Att&CK with threat intelligence to improve Vulnerability Management

MITRE ATT&CK® is a globally accessible knowledge base of 14 adversary tactics and over 500 techniques based on real-world observations. The first model was proposed in 2013 and publicly released in 2015 which has been gathering momentum over the last couple of years.

Virtual Patching: the solution to Windows 10 EOL

Windows 10, which is still the most widely deployed operating system on desktops, has announced end of support for October 14, 2025. The current version, 22H2, will be the last version of Windows 10, which means that Microsoft will stop providing support and security updates for that particular version and any vulnerabilities discovered after the EOL (End of Life) date will not be fixed by Microsoft, leaving your operating system, and that of your customers, exposed to security risks.