Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cyber Security Month in the WFH Era: Three Key Steps to Secure Hybrid Teams

This October, as businesses emerge from the pandemic, many are making strategic decisions about their long-term work arrangements. While there is a substantial debate about remaining remote or bringing people back to the office, many companies are choosing to meet in the middle, embracing a hybrid work arrangement that allows people to work both on-site and remotely.

How to Create a Data-Centric Security Model

Information security used to revolve around securing the locations where sensitive data was stored. Now, with the rise of cloud computing, data can be stored and transferred in an infinite number of ways — making it nearly impossible to protect against data breaches for every single device. The best solution for modern times, then, is a data-centric security model.

5 Step Risk Management Process

At its core, risk management is about identifying risks and guarding against them. It gives organizations a plan of action to determine which risks are worth taking and which aren’t, to assure better outcomes for their bottom lines. In this post we’ll outline the five steps of risk management, which you can use to protect your company against the uncertainties of doing business.

Enhancing Security in your Software Development LifeCycle - Dealing with Dependencies

The adoption of agile practices has resulted in the emergence of shift-lift testing, where testing is performed much earlier in the Software Development LifeCycle (SDLC). Traditional waterfall models performed testing to the right of, or following, development. The benefits of testing earlier and more often cannot be underestimated. However, where does this leave security and security testing?

Introducing AT&T Managed Extended Detection and Response (XDR)

In today’s dynamic threat landscape, having different tools to meet unique security requirements helps keep data protected. However, businesses today have 10 to 50+ security tools and consequently spend too much time managing them instead of protecting against cybercrime. This security tool overload creates internal challenges and potentially distracts from the primary business mission.

Ethical hacker shares top tips to protect your attack surface

The underrated threat of domain takeover and hacking a firm’s internal and external attack surface can enable malicious actors to circumvent many advanced website protection mechanisms. However, Detectify Crowdsource hacker Jasmin Landry says that deploying an external attack surface management (EASM) system can help beef up your security before a malicious hacker wreaks havoc on your company. A common aphorism in cybersecurity is that there’s no such thing as perfect security.

Snyk joins OpenSSF: Tackling open source supply chain security with a developer-first approach

I’m excited to share that Snyk has joined the Linux Foundation’s expanded support of the Open Source Security Foundation (OpenSSF) as a premier member alongside Microsoft, Google, Cisco, Facebook, Intel, VMware, Red Hat, Oracle, and others. As Snyk’s mission is to enable developers to develop fast while staying secure, we believe that this cross-industry collaboration is critical to the future of software development and improving the security of open source.

Interested in a Career in Cybersecurity? These Tips Can Help Guide Your Journey

With the current global cybersecurity talent shortage just over three million, and the cybersecurity job market continuing to grow (31% in the U.S. by 2029), opportunities are plentiful for anyone interested in a career in cybersecurity. In support of this week’s Cybersecurity Awareness Month theme, “Cybersecurity Career Awareness,” I had an opportunity to speak with Dave Stromberg, ThreatQuotient’s Talent Acquisition Manager.