Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How do Cloud Access Security Brokers (CASBs) Work and Should I Use One?

As organizations increasingly adopt cloud services and applications, securing access to these services becomes crucial to protect sensitive data and maintain compliance. Cloud Access Security Brokers (CASBs) have emerged as a key component in providing comprehensive visibility and control over cloud services.

Dependency Management: A Guide and 3 Tips to Keep You Sane

Managing dependencies is not for the faint of heart. For a single project, you may be able to keep up with dependencies on your own. For software codebases with hundreds of modules, however, even the most seasoned developer will quickly descend into dependency hell. Don’t worry: dependency hell has happened to the best of us! There are some things you can do to keep yourself sane and improve application security.

Communication Service Providers Expect Strong Demand

2023 will be a year of growth within the communication service provider (CSP) market according to new data from A10 Networks’ latest research. Its biannual Global Communication Service Provider Insights report was undertaken to understand the priorities, expectations, and perspectives of senior IT professionals in CSPs across the globe by interviewing 2,750 senior IT professionals in a variety of roles across 21 countries.

Introducing new Zero Trust controls in ManageEngine PAM360

We are delighted to announce game changing features now offered as part of ManageEngine PAM360, our enterprise privileged access management (PAM) suite. With PAM360’s new additions to its Zero Trust offering, your organization’s privileged identities will be protected like never before. These updates will be available with the latest version of PAM360.

Ransomware Gangs are "Big Game Hunting" as Victim Org Sizes and Ransom Payments Continue to Rise

Midsize and enterprise organizations take notice: the average and median amount of a ransom payment and the median size of the victim organization are on the rise. If you’re at all concerned about ransomware (and you should be), the latest details from ransomware response vendor Coveware’s latest Quarterly Ransomware Report should have your attention.

78% of Ransomware Victim Organizations Encounter Additional Threats-Turned-Extortions

New data sheds light on how likely your organization will succumb to a ransomware attack, whether you can recover your data, and what’s inhibiting a proper security posture. You have a solid grasp on what your organization’s cybersecurity stance does and does not include. But is it enough to stop today’s ransomware attacks?

FTC Warns of MetaMask and PayPal Phishing Campaigns

The US Federal Trade Commission has issued an alert warning of phishing campaigns that are impersonating PayPal and the MetaMask cryptowallet. “If you got an email that seems to be from MetaMask or PayPal, stop,” the FTC says. “They’re phishing scams. The MetaMask fake says your cryptocurrency wallet is blocked. And, if you don’t act fast, click a link, and update your wallet, they say your crypto will be lost.

The State of Organizational Cyber Defenses Impacts Cyber Insurance Availability, Cost, and Terms

A new report highlights the direct connection between how strong your organization’s security stance is and how easy it is to obtain cyber insurance. Like any insurance policy, the insurer has figured out the indicators of risk and includes a form of assessment when considering issuing you a policy. When you want to obtain car insurance, they ask about your driving record, where you live, and even what your credit score is – all to determine how much of a risk you are.