Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Implement Cybersecurity Automation in SecOps With SOAR (7 Simple Steps)

When it comes to cybersecurity automation, there is the persistent fear that security automation is here to replace humans. And while those fears are somewhat justified, the reality is that automation in security operations is meant to aid, not hinder security professionals. And with cyber threats evolving at a dazzling rate, cybersecurity automation is slowly becoming a necessity, rather than a luxury.

Expert Advice on Starting a Career in Cybersecurity

Do you have what it takes to become a cybersecurity expert? We interviewed 3 security professionals to find out how they got their start and what advice they would give to someone starting their career in cybersecurity. With security threats increasing, much of business continuity has come to rely on data security. In particular, engineering teams building cloud software rely on access to an ever-growing number of computing resources.

Just-in-Time Administration for Secure Access Management

Although external cybersecurity attacks and malware make for sensational headlines, the biggest security threat most organizations face comes from trusted insiders with privileged access to sensitive data. Cybersecurity Insider’s 2020 Insider Threat Report reveals that 68% of organizations report that insider attacks are becoming more frequent and that they feel vulnerable to them.

Protect Your Business from Ransomware as a Service

Cloud-based business models such as infrastructure as a service and software as a service have balloon in popularity, gaining mainstream acceptance in recent years. Cloud providers benefit from superior economic models that scale while also reducing their development risk and complexity. However, with success comes attention, so it’s only logical that criminals have emulated these models.

Fortinet, potential vector for Lockbit ransomware attack against Accenture

Accenture has acknowledged that it was the victim of a ransomware attack on July 30 in what it described as a "security incident." As reported by Cyberscoop, the hackers (a gang known as LockBit) began leaking stolen data and threatened to release further compromised information. LockBit first emerged in 2019 and its ransomware cyberattacks primarily target large corporations, from which it hopes to extort large sums of money.

Protect sensitive data with the right balance of AppSec tools and services

Using the right AppSec tools and services throughout the software development life cycle can help you properly secure your sensitive data. One of a CISO’s primary responsibilities is protecting their company’s digital assets, and adhering to current and emerging data privacy laws is crucial. Organizations must ensure that their corporate intellectual property and user data (e.g., customer, employee, contractor and/or prospect data) is safe from cyber attacks and data breaches.

HTTP/3 and QUIC: A new era of speed and security?

HTTP/3 is the third and upcoming major version of the Hypertext Transfer Protocol (HTTP) used across the web.HTTP has been the main protocol on the internet since the 1990s, with the second release (HTTP/2) introduced in 2015 as a major update with many new features. Whilst request methods and status codes will remain the same, HTTP/3 makes a departure from its predecessors by not using the Transport Control Protocol (TCP) as the underlying transport layer.