Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Launching GitGuardian Honeytoken: your powerful ally to detect any breaches in the supply chain!

What if you could detect intrusion and code leakage early in your software supply chains? Introducing GitGuardian Honeytoken, the solution that protects your software supply chains against potential intrusions on SCM systems, CI/CD pipelines, software artifact registries, and more.

Trustwave Announces Operational Technology Security Maturity Diagnostics

Trustwave has just launched OT Security Maturity Diagnostic, which is an assessment and advisory service centered on ensuring the security of industrial automation and control systems. OT Diagnostic by Trustwave is optimized to gain insight into an organization’s current state of OT security across people, processes, and technology.

Customize rules for detecting cloud misconfigurations with Datadog Cloud Security Management

For organizations in highly regulated industries, any misconfiguration in their cloud environments can be detrimental to customer trust and privacy if overlooked. To mitigate this risk, DevOps and security engineers follow recognized compliance standards to quickly surface issues in their AWS, Azure, or Google Cloud environments. Organizations can take this work a step further by developing detection rules tailored to their unique business or security goals.

How to Interpret and Respond to Penetration Testing Results

A Penetration Test can provide you with a wealth of information about the security of your systems and how vulnerable they are to attack. The results of a penetration test can help you understand where your weaknesses are and what needs to be done to fix them. These results are reviewed from low to critical to give you a clear understanding of how severe the vulnerability is.

Oracle's Arthur Barnes: The evolution of cybersecurity and solving the challenge of hiring the right team

In this episode of the Future of Security Operations podcast, Thomas interviews Arthur Barnes, Senior Director of Security Operations at Oracle – the world’s largest database management company. Arthur is an experienced cybersecurity leader with 20 years of experience, having previously worked at Pearson, Dell, and M&S.

Foresiet Discovers Data Breach of Texas Healthcare Company

In a recent dive into the deep web, Foresiet, the cyber security firm has made a shocking discovery. Our team has uncovered a massive data breach of a healthcare company in Texas, US. The data breach has resulted in the exposure of sensitive patient information and has left the affected patients vulnerable to identity theft and other serious consequences. The Breach Details During our deep web exploration, we stumbled upon a downloadable link to the breached data.

Top 5 uses of blockchain in supply chain

It’s April, designated National Supply Chain Integrity month by CISA, NCSC, ONCD and Department of Defense, to promote resources, tools, and information to help organizations and agencies secure their supply chains and build resilience. But what role does blockchain play in supply chain and how easy is it to implement? Blockchain technology has numerous potential applications in supply chain due to its ability to provide a secure, transparent, and tamper-proof ledger of transactions.