Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Avoiding Pitfalls in Vulnerability Management: Key Insights and Best Practices

Vulnerability management (VM) has always been a complex area of concern that requires continuous and active effort to work properly. This can make it challenging for organizations to maintain their VM strategies and solutions over time, as there are many angles to secure and processes to oversee. There are a wide range of potential ways that VM can go wrong, and it is essential for organizations to avoid the many pitfalls associated with it.

A Recap of the SF OWASP Meetup, Hosted by Semgrep and Jit

On February 15th, our friends at Semgrep hosted a meet up for the OWASP community at their beautiful office in San Francisco. Application security professionals and developers in the San Francisco tech community showed up to discuss what has been working for them, what isn’t working, and upcoming trends in the world of application security. In this short recap, we’ll explore some of the topics discussed by Semgrep’s Kyle Kelly and our very own Aviram Shmueli.

Reflecting on 2024: Key Cybersecurity Trends and ThreatQuotient Milestones

This year, organizations increasingly recognized the importance of cybersecurity automation. According to our 2024 Evolution of Cybersecurity Automation Adoption report, 80% of senior cybersecurity professionals now consider automation crucial, up from 75% last year. Notably, 39% have secured new budgets specifically for automation, highlighting a strategic shift towards more efficient and scalable security operations.

Risky Business: Working with Third Parties Across the Globe

To show regional differences, BlueVoyant’s latest research report includes C-level executive responses from organizations in the U.S. and Canada, U.K., Continental Europe, and APAC. Singapore had among the lowest reported negative impacts from third-party cyber breaches, while the U.K. had the most. Regional differences play a notable role in shaping how organizations approach and handle third-party cyber risk management (TPRM).

Grow Your MSP Practice with SecurityScorecard MAX

Managing vendor security is a growing challenge for MSPs. Clients expect you to deliver enterprise-grade protection across their entire supply chain. However, many struggle with limited resources, manual processes, and the complexity of addressing third-party risks. SecurityScorecard MAX turns this challenge into an opportunity, helping you protect your clients while driving recurring revenue for your business.

Protecting Your Business from Web Scraping as a Service

Since the early days of the World Wide Web, automated scripts known as bots have been crawling cyberspace, collecting data for various purposes. Initially, these bots were designed to be helpful, cataloging information much like search engines such as Google and Bing do today. However, the volume of automated requests has grown significantly. Today, bots account for a substantial portion of web traffic, costing businesses considerable resources to handle unwanted or malicious requests.

Logins Are Cheap. Peace of Mind Is Priceless.

Imagine a typical morning at an enterprise: employees, remote workers, contractors and partners log in, browsing and accessing apps and files they need to do their jobs. All seems calm. But behind the scenes, security teams face a different reality. They’re managing an explosion of high-risk identities and passwords across countless endpoints, dealing with unchecked admin rights, rising security costs and compliance pressures.

NDR in the Era of Cloud and Hybrid Environments: Why It's Essential

With cloud infrastructures expanding across private, public, hybrid, and multi-cloud models, effective security monitoring is essential. Gartner’s 2024 Hype Cycle for Workload and Network Security suggests that NDR solutions are becoming critical in these diverse environments and could reach widespread adoption within the next two to five years. This trend underscores the importance of NDR for visibility and rapid threat detection in today’s complex cloud landscapes (see Figure 1).

Security Culture: Moving Beyond Basic Awareness Training

By James Rees, MD, Razorthorn Security The landscape of cybersecurity awareness has changed dramatically in the last 25 years. What began as simple password guidance and basic IT training has evolved into a complex web of security challenges that organisations must navigate daily. Back in December 1999, the world held its breath waiting for the Y2K bug to wreak havoc on computer systems globally.

Forget Mono Repo vs. Multi Repo - Building Centralized Git Workflows in Python

This blog article summarizes a talk given by David Melamed, Jit CTO, at Pycon DE & PyData 2022 in Berlin. In every software development project, before even writing the first line of code, you gotta pick an architecture for your repo. Picking an architecture is not easy. There are many tradeoffs that need to be considered and this choice will impact future development.