Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is Code Signing? Benefits of DigiCert Code Signing Certificate

Whether you’re someone who creates computer software or just uses it, it’s essential to know about the code signing process. It is crucial to do so, as this is one of the methods that help you keep your computer safe and secure. Now, it might be possible that after reading the above content, you start wondering what code signing is and why it is important.

CISA Publishes Advisory on Improving Network Monitoring and Hardening

CISA released in late February a cybersecurity advisory on the key findings from a recent Cybersecurity and Infrastructure Security Agency (CISA) red team assessment to provide organizations recommendations for improving their cyber posture. According to the Agency, the necessary actions to harden their environments include monitoring network activity to spot abnormal behavior, conducting regular assessments and drills, and enforcing phishing-resistant MFA anywhere possible.

Introducing Questionnaire Automation

Following our recent acquisition of Trustpage, we are excited to announce Questionnaire Automation, a solution designed to help organizations in quickly responding to security questionnaires and effectively communicating security and compliance to customers and prospects. This solution utilizes the fastest and most accurate automation technology to provide security questionnaire responses.

What is Search Engine Phishing?

Search engine phishing, also known as SEO poisoning, is when cybercriminals use search engine optimization to appear as the top results on a search engine in an attempt to lead searchers to a spoofed website. The spoofed website is made to look like a legitimate site so that those who click on it proceed to log into their accounts like usual.

6 Tips Any CISO Can Use to Inform their Organization's Executives on Cybersecurity

A Chief Information Security Officer is a person who is always in a tough spot. Not only is a CISO responsible for the day-to-day safety of their organization, but they must be able to explain to the C-Suite what is going on from a cybersecurity perspective and do so in language that the other executives understand. After all, what a CISO has to say is all about protecting the business from threats to its computer system and reducing risk, items that need to be on every corporate management agenda.

How to Pitch Zero-Trust to Technology Executives

Why should organizations fund zero-trust architectures? The business benefits of zero-trust are significant. By adopting the "never trust, always verify" mindset, organizations shift to a more centralized security management approach, which can result in cost-effectiveness and a stronger layer of protection for resources such as identities, data, and applications.

Inevitable security incidents: The Unavoidable Reality

Incidents are an inevitable part of security, no matter how airtight your processes and systems are or how small your company is. Organizations saw a 125% increase in incidents from 2020 to 2021. Despite the tremendous amount of investments in security by major companies such as Uber, Okta, Microsoft, FireEye, and even the US Government over the past half-decade or so – they have all been successfully targeted by cyber attackers.

KFC, Pizza Hut, and Taco Bell Parent Company Discloses the Details of a Recent Data Breach

Yum!, a massive worldwide food brand, operates over 55,000 restaurants in a total of 155 countries. The brand has more than 36,000 employees and owns restaurants like KFC, Taco Bell, and Pizza Hut, among others. The brand was recently hit by a data breach that may have exposed some of its employees as well as some customers. This is a real issue that should have people a bit concerned.