Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Zero-Days Work And Why They Aren't Going Away Anytime Soon

Few security exploits are the source of more sleepless nights for security professionals than zero-day attacks. Just over Memorial Day weekend, researchers discovered a new vulnerability enabling hackers to achieve remote code execution within Microsoft Office. Dubbing the evolving threat the Follina exploit, researchers say all versions of Office are at risk.

US DoD's Adoption of Zero Trust Heats Up

The US Department of Defense (DoD) initiative to adopt the Executive Order for Zero Trust is heating up. This week the Pentagon’s CIO, John Sherman, announced plans to implement a zero trust architecture agency-wide within the next 5 years – by 2027. To support this initiative, he plans to announce a new strategy next month to help meet the ambitious deadline for an agency of over 4 million people.

Fortify Your SD-WAN With SSE Integration

Many of today’s security tools are built to secure cloud services. But we need to keep in mind that many organizations still require configurations that don’t have direct connection to the cloud. Organizations that have numerous branch locations — like convenience stores, school districts and banks — often use a software-defined wide area network, or SD-WAN.

Cyber Skills Shortage? The Time for Security Automation Is Now

Many industries are affected by skills gaps, but according to Cybersecurity Ventures, the shortage within the IT/cybersecurity sector is nearly unmatched: Over an eight-year period, the number of unfilled cybersecurity jobs increased from one million positions in 2013 to 3.5 million in 2021.

Prevent API Exploitation: Know the Unknown, Protect the Unprotected

Almost a year ago, Gartner predicted that API attacks would be the most frequent enterprise attack vector in 2022. Strengthening API security is more critical today than ever and must be at the core of cybersecurity strategy to prevent API exploitation. To make matters worse, the lack of API visibility weakens core security principles. More organizations don’t have an accurate inventory of APIs, and it is not surprising for 30% of APIs to be unknown.

Managing your IoT Device Security: A Guide to Best Practice in 2022

The explosive growth of the Internet of Things (IoT) is changing the way we live, with over 27 billion connected devices by 2020, it’s no wonder that businesses are looking to IoT solutions to improve efficiency and drive innovation. However, with this increased connectivity comes a variety of new security threats that need to be addressed. In this article, we will discuss best practice guidelines for managing your IoT security.

MeBeBot Trust Champions Achieve SOC 2 Compliance

What is a Trust Champion? A Trust Champion is the person who helps their organization measure and meet their internal compliance obligations. Their actions support revenue-generating activities, protect their organization from legal and contractual liabilities, and enable the organization to confidently and transparently showcase an intentional, robust, and differentiated culture of trust. Beth White – Founder & CEO – has been greatly involved with MeBeBot’s compliance procedure.