Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Send Large Video Files in Privacy Without Reducing Quality

Sending large video files with others can be more complex than you anticipated. We often encounter problems because of file size limits, reduced quality, or privacy concerns. To help you solve these issues, we will offer you advice on how to send large video files securely, methods to compress files to bypass size restrictions, and a file-sharing solution that is the best way to send video files without worrying about your privacy.

Top JFrog Security Research Discoveries of 2024

In our previous round-up of security research for 2023, we mentioned our surprise at the large volume of 29,000 vulnerabilities that were reported two years ago. But that didn’t prepare us for the astounding 40% increase, reported by Cyber Press, resulting in over 40,000 CVEs that were published over the past year in 2024.

What is ACME Protocol and How does it Work: A Complete Guide

You might have visited a website and seen a warning that says: “Your connection is not private.” This often happens when a website’s security certificate has expired. It is a small oversight that can harm a website’s reputation and make visitors think twice before proceeding. For website owners, managing digital certificates manually can be a real challenge. To simplify this process, the ACME Protocol was developed.

How Trustwave's Fusion Platform Analyzes Ransomware Tactics in the Energy Sector: A Comprehensive Overview

Trustwave SpiderLabs has multiple methods and tools available to keep its teams apprised of the tactics, techniques, and procedures (TTPs) threat groups utilize during an attack, but perhaps the most useful is our cloud-native Fusion dashboard.

Beware: Mobile Phishing Mimicking the USPS Is On the Rise

Researchers at Zimperium warn that a large phishing campaign is impersonating the US Postal Service (USPS) to target mobile devices with malicious PDF files. The goal of the campaign is to direct users to a spoofed USPS website designed to harvest personal information. “The investigation into this campaign uncovered over 20 malicious PDF files and 630 phishing pages, indicating a large-scale operation,” the researchers write.

Reimagining the Role of the CIO in Business-led IT

This blog is a follow-up to the post Opportunities & Risks for Digital-first Leaders in Business-led IT The days of shadow IT as an unregulated threat are over. Business-led IT represents a fundamental shift in how organizations innovate and operate. To succeed in this new reality, CIOs must embrace what I call the “New CIO” mindset.

Why Federal Agencies Need Enterprise Password Management Despite Smart Card Authentication

As a former federal CISO, I’ve observed a persistent and dangerous misconception within government agencies: the belief that smart card authentication eliminates the need for enterprise password and Privileged Access Management (PAM) solutions. This assumption creates critical security vulnerabilities that deserve closer examination.

January Release Rollup: Copilot - Knowledge Base Reports for Admins, Preview Analytics and More

We’re excited to share new updates and enhancements for January, including: For more information on these updates and others, please read the complete list below and follow the links for more detailed articles.

Building AI and LLM Inference in Your Environment? Be Aware of These Five Challenges

Building AI and LLM inference and integrating it in your environment are major initiatives, and for many organizations, the most significant undertaking since cloud migration. As such, it’s crucial to begin the journey with a full understanding of the decisions to be made, the challenges to overcome, and the pitfalls to be avoided along the way.