Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is Security as Code and How to Get Started Implementing it

Modern companies are rapidly adopting cloud applications and services due to scalability, cost savings, and faster time to market. DevOps teams and developers must deliver fast, secure code while protecting secrets and log files, creating a growing concern over the security risks of this digital transformation. According to a recent report, more organizations are adopting security as code (SaC) practices, with 62% of respondents citing it as a priority.

How SMBs Can Build an Effective Risk Management Plan

As the Chief Information Security Officer (CISO) at Arctic Wolf, I have a deep bench of security experts I can leverage to provide the organization with robust risk management, threat detection, security awareness training, and incident response. That’s an advantage that small businesses often don’t have.

The Speed of Security & AI

ThreatQuotient’s Perspective on Security Operations and vision for AI in the ThreatQ Platform We’re all familiar with the “speed of cybersecurity”, the rapid pace at which cyber threats evolve and the corresponding need for timely and agile defense measures. We’ve been trained to understand the importance of quickly detecting, analyzing, and mitigating cyber risks to stay ahead of attackers and protect assets in an increasingly dynamic and interconnected world.

The Importance of the Golden Thread to Safely Design and Construct Buildings

Following the Grenfell Tower tragedy, the UK government commissioned Dame Judith Hackitt to conduct an independent review of building regulations and fire safety. In her report, "Building a Safer Future," Dame Judith proposed the use of a "Golden Thread" as a tool for managing buildings as holistic systems and enabling people to design, construct, and operate their buildings safely and efficiently.

Netskope Uses AI to Help Protect Sensitive Data Stored in Amazon S3 by AWS AppFabric

Spending for software-as-a-service (SaaS) applications is projected to grow 17.9% to $197 billion in 2023, then grow another 17.7% to $232 billion in 2024. This rapid growth is being fueled by several factors including the desire to modernize IT environments and enable hybrid workers, who might login from a branch office one day and a hotel room the next.

iOS Application Penetration Testing Checklist [153 Test Cases in a Free Excel File]

Get Free iOS Application Penetration Testing Checklist Apple’s recent release of iOS 16 for the iPhone brings important new security features. Despite the inherent security features of iOS, additional measures, techniques, and guidelines can be employed to fortify the protection of user data and ensure privacy. Having previously covered the Android penetration testing checklist and security assessment, it is time to focus on iOS.

California State Retirees Hit by Data Breach: More than 770,000 Impacted

Both CalPERS and CalSTRS are agencies that manage retirement funds and health benefits for retired California teachers, government employees, and more types of public service employees. These organizations handle a huge amount of personal and financial data for teachers and other individuals, and they even handle pensions for them. That's why it's so upsetting to learn that both CalPERS and CalSTRS were impacted by a recent data breach.

Be Smart About Attack Surface Management Automation

Smart automation in ASM refers to the application of intelligent and adaptive technologies and tools to automate the attack surface management process. By leveraging machine learning algorithms and artificial intelligence technologies, enterprises can automate discovery and threat exposure, drastically reducing the time and resources required for the process. They can also minimize false positives and false negatives.

Cyber Insurance Today: What's Covered (What Isn't), Insurance Types & Benefits of Opting In

Even with the best strategies in place, cyber professionals understand that it’s only a matter of when, not if, a cyberattack will happen. Hence, a risk management and incident response plan is necessary for an organization’s cybersecurity posture. While such plans won’t wipe out the financial and reputational aftermath of a cyberattack — a cyber insurance policy can help your organization recover from such attacks.

Data Exfiltration: Prevention, Risks & Best Practices

Imagine a scenario where a competitor gains access to your organization's most sensitive data, causing severe financial loss and irreparable damage to your reputation. This nightmare can become a reality through data exfiltration. Data exfiltration is a real threat to organizations, as it involves the unauthorized transfer of sensitive information, the effects of which can lead to operational disruption, financial losses and damage to reputation.