Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is an endpoint, and what does it mean in cybersecurity?

These days, everything is connected to everything else. Endpoints are the most important parts of modern networks because they let people communicate and run processes. But what does an ending really mean? An endpoint is any device that can join a network. This includes laptops, smartphones, tablets, servers, and even Internet of Things (IoT) devices like smart thermostats and wearable tech. People can connect to networks with these devices, but they also have security holes that hackers can use.

How SAST Enhances Product Security at Egnyte

In today's fast-paced software development environment, security can no longer be an afterthought. Product security aims to embed security at every stage of the development lifecycle, and Static Application Security Testing (SAST) plays a crucial role in this process. By scanning source code early in the pipeline, SAST helps developers catch security issues before they reach production.

An easy to follow NIST Compliance Checklist

We have seen how cyber attacks have disrupted organisations and businesses repeatedly. Mitigating emerging threats is crucial more than ever, and many organisations are at the forefront of combating them. One such organisation is the National Institute of Standards and Technology (NIST). NIST has released many Special Publications (SP) regulations, each containing guidelines for improving organisations’ security postures.

Top three cyber threats that will persist in 2025

As another year comes to an end, it’s not only Santa who brings presents for those on his nice list. These days, it’s quite common for well-known firms to publish their annual roundups of the most notable events that have taken place in the cybersecurity landscape, together with predictions of what can we expect in next twelve months.

Critical Features Your Attack Surface Management Tool Must Have

Attack surface management (ASM) is becoming a vital tool for any organization that utilizes digital assets or is undergoing digital transformation. Whether it’s web applications, IoT devices, or endpoint entry points, every digital asset escalates an attack surface in complexity and size.

Is Your Website Leaking Sensitive Patient Information to Facebook? A disturbing story about HIPAA (and How to Avoid It)

Picture this scenario: You’ve used every tool you have to secure your web pages and forms so patient information is safe. One day, a potential patient Googles “hysterectomy options” and ends up on your hospital’s website. They browse around, maybe even schedule an appointment online. You have no reason to worry, right? Because you’ve done what you could to secure those pages.

80% of Cybersecurity Leaders Prefer Platform-Delivered GenAI for Stronger Defense

Adversaries are advancing faster than ever, exploiting the growing complexity of business IT environments. In this high-stakes threat landscape, generative AI (GenAI) is a necessity. With organizations grappling with skills shortages, sophisticated adversaries and operational complexity, 64% of security professionals have already kicked off their GenAI purchase journey.

Living Up to Its Name: Alleged Extortion Group LeakedData Begins to Leak Data

Data leaks sites (DLSs) commonly debut with a small number of claimed victims. When Cyjax discovered them, newly found DLSs for extortion groups FunkSec and Kairos claimed 11 and six victims, respectively. In contrast, a newly identified possible extortion group which aptly calls itself ’LeakedData’ has emerged onto the scene with an alleged total of 41 victims.

Forward Networks Recognized as an Outperformer in GigaOm's 2024 Radar for Network Validation

Forward Networks has been named an Outperformer in the 2024 GigaOm Radar for Network Validation for the third consecutive year. Among 15 vendors, Forward Networks achieved the highest overall score for key features and business criteria, cementing its position as an innovator and leader in the market.