Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Is NISPOM?

The National Industrial Security Program (NISP), the authority within the United States for access to classified data by government contractors. Have outlined requirements to ensure continued availability and integrity of classified data, and prevent its unauthorised disclosure. The operating manual (NISPOM) affects all government agencies and commercial contractors who have access to classified data.

Trustwave Partners With Tech Advisory Firm Bridgepointe

Trustwave has achieved supplier status with Bridgepointe, a tech advisory firm that helps mid-market and enterprise companies transform tech investments into unrivaled business results. The Bridgepointe deals connects Trustwave to Bridgepointe’s expansive network to provide Trustwave security consulting, managed detection and response, threat hunting, co-managed SOC, database security, and email security services to their set of clients.

Lookout Announces Advanced Traffic Steering Agents to Replace Virtual Private Networks

For more than two decades, virtual private networks (VPNs) have been the go-to technology for enterprise remote access — and by extension, for enforcing remote access security. Even ubiquitous internet connections are often redirected via VPN to a central data center, where security enforcement occurs through various hardware appliances. From there, the traffic is forwarded onward to the internet. Of course, it must follow the same indirect path back on the response side.

Impact of Generative AI on Identity Proofing

Generative AI, the transformative technology causing a stir in the global tech sphere, is akin to an enthralling narrative with its charming allure and consequential dark underbelly. Its most notable impact is forecasted in the realm of identity proofing, creating ripples of change that demand our immediate attention.

SkopeAI: AI-powered Data Protection that Mimics the Human Brain

In the modern, cloud-first era, traditional data protection technology approaches struggle to keep up. Data is rapidly growing in volume, variety, and velocity. It is becoming more and more unstructured, and therefore, harder to detect, and consequently, to protect.

Elastic Security 8.9: Streamline the analyst experience with GAI and advanced analytics

Elastic 8.9 introduces the generative AI sidekick, enhanced rule tuning, new lateral detection capabilities, and more! These new features provide security practitioners with advanced detection and analytics, easy to access information, more ways to customize your security investigations, and additional deployment options.

Code Signing for Secure DevOps and DevSecOps: Centralized Management and Automation

Today’s fast-paced digital landscape requires quick actions and top-notch safeguarding. Code signing is crucial in providing that security, but teams must approach the process effectively. Unfortunately, managing digital certificates, a vital component of code signing, often becomes complex and error-prone for organizations, leading to potential risks and vulnerabilities.

Code Signing Abuse: How to Safeguard Your Certificates?

Code signing certificates are crucial in verifying a software application’s source and assuring users that the code has not been tampered with or maliciously modified. However, like any security measure, code signing is not immune to abuse. Hackers and cybercriminals are constantly finding new ways to exploit vulnerabilities in digital signing processes, making it imperative for developers and organizations to take proactive steps to safeguard their code signing certificates.

Five Critical Security Platform Gaps to Avoid

The debate surrounding the integration of best-of-breed versus a single-vendor security platform has been discussed for some years. On one side, we have niche solutions that offer a specialized approach to addressing cybersecurity challenges. On the other side, there are the potential benefits of a consolidated platform that promises seamless interoperability for an exponential improvement of security posture.

Here's how External Attack Surface Management and Penetration Testing compare

“How does Detectify’s External Attack Surface Management platform compare to Penetration testing” or “What I’m really looking for is Penetration testing” are two statements we often hear when talking to prospects. We know that many of you are keen to understand how EASM compares with Penetration testing (Pen testing), so we’re exploring these two methodologies side-by-side.