Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Introducing Veracode Risk Manager: A New Chapter in ASPM Built for Scale

In a digital world that’s evolving faster than ever, industry landscapes are shifting, and customer needs are becoming more complex. At Veracode, we recognize these fundamental changes in the application security space. That’s why Veracode strategically acquired Longbow Security, now rebranded as Veracode Risk Manager.

How to Monitor Employees at Work: 7 Best Practices

Employee monitoring in the workplace is essential for maintaining security in many industries, but you must be aware of its potential pitfalls. Balancing workplace monitoring with employee trust and legal compliance can be challenging. In this article, we’ll explore seven best practices to ensure your employee monitoring methods enhance security and boost productivity while complying with the applicable laws and regulations and respecting your employees’ privacy.

OT Security Challenges and Solutions for Critical Infrastructure Protection

Critical infrastructure systems, such as power plants, water treatment plants, transportation networks, and factories, depend on operational technology (OT) to work. OT systems are meant to handle physical devices and processes, while traditional IT systems are mostly concerned with keeping data and information safe. Because of this main difference, OT security is very hard, especially since OT networks are becoming more and more linked to IT networks, which makes them more open to cyber dangers.

Money 20/20 Marks Major Inflection Point in Stablecoin Utility

This year’s Money 20/20 event brought industry leaders together to discuss the latest in payments and fintech. Many conversations at the event underscored certain key trends that are rapidly shaping the payments landscape. The shift in the types of conversations around stablecoins happening today is undeniable – the question has moved beyond “Why stablecoins?” to “How do we do this today?” Here are three major takeaways from this year’s event.

How Bot Expertise Stopped the Google Translate Bot Proxy Technique

Bot attacks are evolving to become more sophisticated. Attackers have built businesses around the data and assets they extract with bots, so they constantly seek ways to bypass defenses. Developers work tirelessly to assess bot defenses and find new methods to evade them. Traditional, client-side defenses are visible to attackers, making it easier for them to bypass. But even advanced defenses must stay alert, embedding bot expertise to keep pace with these evolving tactics.

Is the ASX 200 Resilient to Cyber Threats? Our Report Says No.

In today’s rapidly evolving digital landscape, managing cyber risk has become essential for sustaining corporate growth and resilience. Cyber risk management requires balancing corporate growth against the evolving tactics of threat actors and governmental regulations – a daunting task that requires continuous measurement and strategic reflection.

Criminal Threat Actor Uses Stolen Invoices to Distribute Malware

Researchers at IBM X-Force are tracking a phishing campaign by the criminal threat actor “Hive0145” that’s using stolen invoice notifications to trick users into installing malware. Hive0145 acts as an initial access broker, selling access to compromised organizations to other threat actors who then carry out additional cyberattacks.

OpenShift Disaster Recovery: Ensuring Business Continuity

What happens if your critical OpenShift applications suddenly crash due to a major system failure or cyber attack? How fast could you bounce back and get things running again? Having a solid OpenShift disaster recovery plan isn’t just a nice-to-have — it’s essential for keeping your business going when the unexpected hits. This guide walks you through the key elements of building a strong disaster recovery setup for your OpenShift environment.

Mend.io is a Strong Performer in the Forrester Wave Software Composition Analysis, Q4 2024

It should be no surprise that the world runs on open source software. According to the latest Forrester Wave Software Composition Analysis Q4 2024 report an “astonishing 77% of codebases are comprised of open-source software.” Since a “considerable amount of an application’s risk is due to third-party sources,” software composition analysis (SCA) tools remain the lifeblood for securing modern applications and bringing greater transparency to the software supply chain.

CloudCasa November Feature Updates - Support KubeVirt!

Following our previous release by less than a month, our November feature update (which we are not coincidentally releasing just before KubeCon NA 2024) is dedicated to providing enhanced support for KubeVirt and KubeVirt-based systems such as SUSE Harvester and Red Hat OpenShift Virtualization. KubeVirt is a Kubernetes extension that lets users natively run traditional Virtual Machine (VM) workloads alongside container workloads in their Kubernetes or OpenShift clusters.