Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Cloudflare is helping domain owners with the upcoming Entrust CA distrust by Chrome and Mozilla

Chrome and Mozilla announced that they will stop trusting Entrust’s public TLS certificates issued after November 12, 2024 and December 1, 2024, respectively. This decision stems from concerns related to Entrust’s ability to meet the CA/Browser Forum’s requirements for a publicly trusted certificate authority (CA).

The Difference Between Pentesting, DAST and ASM

Penetration testing, dynamic application security testing (DAST), and attack surface management (ASM) are all strategies designed to manage an organization’s digital attack surface. However, while each aids in identifying and closing vulnerabilities, they have significant differences and play complementary roles within a corporate cybersecurity strategy. Let’s take a quick look at the definition of each of these strategies.

Securing Enterprise Copilots: A Fresh (and Agent-less) Application Security Approach

Today, we are excited to announce a significant milestone in our journey to secure enterprise copilots and low-code development platforms by launching our new product; the Zenity AI Trust Layer. This new offering provides full security and governance control for enterprise copilots, and in the first step is focused on Microsoft 365 Copilot. The use of enterprise copilots is undeniably a story in low-code application development.

Secure your Elastic Cloud account with multifactor authentication (MFA)

In an era where cyber threats are constantly evolving, protecting your identity and data from unauthorized access is more critical than ever. That's why we're excited to bring you the enhanced multifactor authentication (MFA) for Elastic Cloud. This feature significantly strengthens the security of your Elastic Cloud user and deployment data by aligning with industry best practices. You can go to Elastic Cloud and complete your MFA setup today.

The Imperative of API Security in DevOps

Consider a modern software application as a constellation of cities that dot the landscape. These cities are components such as databases, authentication services, business logic engines, and more. Requests travel between components carrying data just as citizens travel between cities carrying their belongings. The highways that connect the cities on this map are your APIs. Cities get the most attention, often receiving the security and protection they need.

Is Character AI Safe? Artificial Intelligence and Privacy - Issues and Challenges

Since the technological “birth” of Artificial Intelligence and ChatGPT, many people are wondering what on earth they would do without AI in their lives. Since July 2024 ChatGPT has had 200 million weekly active users worldwide and attracted nearly 2.5 billion site visitors. However, ChatGPT is not the only AI out there.

Telecom Giants Unite to Revolutionize API Innovation on a Global Scale - Are You Prepared?

In a groundbreaking move, some of the world’s largest telecom operators—América Móvil, AT&T, Bharti Airtel, Deutsche Telekom, Orange, Reliance Jio, Singtel, Telefonica, Telstra, T-Mobile, Verizon, and Vodafone—are partnering with Ericsson to launch a new venture aimed at transforming how network Application Programming Interfaces (APIs) are accessed and used.

Build Security Workflows in Seconds with AI Workflow Builder

In today’s fast-moving threat landscape, Hyperautomation is essential. But building workflows from scratch? That’s time you don’t have. That’s why we started with a library of pre-built templates, helping teams quickly configure security automation workflows. Templates made automation more accessible. Now, we’re taking the next step in that evolution and introducing Torq’s AI Workflow Builder. By harnessing the power of AI, we’re going beyond templates.

What is the KEV Catalog?

With external threats looming as a constant source of potential disruption, multiple government agencies have coordinated to compile a catalog of Known Exploited Vulnerabilities (KEV). The Known Exploited Vulnerabilities Catalog, or KEV catalog, is a database of actively exploited vulnerabilities, including those that have been exploited by ransomware campaigns, that can help application security professionals in the public and private sectors monitor threats and prioritize fixes.

CMMC Compliance: What You Need to Know for CMMC 2.0

Cybersecurity Maturity Model Certification (CMMC) is a critical framework for protecting sensitive information within the defense industrial base (DIB). With the transition to CMMC 2.0, organizations that do business with the Department of Defense (DoD) must ensure they meet evolving cybersecurity standards.