Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Scaling DevSecOps with Dynamic Application Security Testing (DAST)

In the swiftly evolving landscape of AI-driven software development, DevSecOps helps strengthen application security and quality. Dynamic Application Security Testing (DAST) is a key tool that helps scale your DevSecOps program by facilitating continuous and accurate security tests on running applications. DAST simulates real-world attacks, enabling you to identify security weaknesses and evaluate your application's defenses in response to actual attacks.

What Is a Pig Butchering Scam: How to Protect Your Financial Future

How far are you willing to go to obtain love? Online threats surround us every time we get on the Internet—all of them are out for more than a lasting emotional connection. Romance scams are the most insidious of online threats, not because they wreck the emotional and financial statuses of their victims but because they are incredibly well-thought-out.

Cybersecurity leadership in an era of public-private partnerships

SecurityScorecard recently hosted a webinar with our Co-founder and CEO, Dr. Aleksandr Yampolskiy, and Sue Gordon, the former Deputy Director of National Intelligence and SecurityScorecard board member. Gordon drew on her experience as a key advisor to the President and National Security Council to discuss the shared responsibility between public and private organizations in combating cyber threats, the concentration of cyber risk, and the value of easy-to-understand cybersecurity metrics.

Selecting the Optimal Threat Intelligence Platform in 5 Steps

To use threat intelligence and data more productively, many organizations are investing in a threat intelligence platform (TIP). Selecting a TIP is important as it will serve as the foundation for your entire security operations program, allowing you to understand and act upon the highest priority threats you face, while enabling you to get more from your existing resources — technology and people. However, amidst a plethora of options, selecting the right TIP can be daunting.

New Research: Number of Successful Ransomware Attacks Rise 29% in a Just One Year

New analysis of Q1’s ransomware attacks uncovers a single group responsible for the majority and discusses what makes them so successful. This sort of analysis helps to establish threat landscape trends and keeps our collective focus on the places where cyber attacks are working.

Building your own AI app? Here are 3 risks you need to know about-and how to mitigate them.

After the debut of ChatGPT, and the ensuing popularity of AI, many organizations are leveraging large language models (LLMs) to develop new AI-powered apps. Amidst this exciting wave of innovation, it’s essential for security teams, product managers, and developers to ensure that sensitive data doesn’t make its way into these apps during the model-building phase.

Insider Threats Maintain a Rising Trend

“When the cat’s away, the mouse will play,” the old adage goes. Filings to anti-fraud non-profit Cifas would support that claim, as Insider Threat Database (ITD) reports rose by 14% this past year and are largely attributable to hard-to-monitor work-from-home employees mixed with “increasing financial pressures.” The report details further incidents of dishonest behavior as recorded this year by the UK’s National Fraud Database (NFD).

What Does Incognito Mean, How Does It Work, and Is It Really Safe?

How do you browse the Internet? Using a primary browser, you can turn on “incognito mode,” which increases your privacy on singular devices but is also less concealing than other privacy tools like virtual private networks (VPNs). The functionality of these modes differs between browsers. While the mode offers reliable personal security, it also lacks cybersecurity defenses and is often used by those with misconceptions about how the tool works. So, what is incognito mode?