Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

The Difference Between Vulnerability Assessment and Vulnerability Management

In today’s constantly evolving cybersecurity threat landscape, you have to do everything possible and then some to protect your critical data assets. Performing a vulnerability assessment and implementing a vulnerability management program can help your organization effectively deal with cybersecurity vulnerabilities. However, it’s important to understand the difference between vulnerability assessment and vulnerability management.

AT&T Cybersecurity receives Frost & Sullivan award in Managed Security Services

Recently, we learned the good news from industry analyst firm, Frost & Sullivan, that we received the 2019 Frost Radar Award for Growth, Innovation & Leadership (GIL) in the Global Managed Security Services (MSS) Market. Frost & Sullivan’s global team of analysts and consultants recognized our achievements in innovating and creating new products and solutions that serve ever-evolving customer needs.

NormShield vs. UpGuard Comparison

Every week the news is full of new exposures of protected health information (PHI) and personally identifiable information (PII). These security incidents are not only more common but also more costly. The average cost of a data breach is now nearly $4 million globally and third-party vendors, cyber attacks, and misconfiguration are three of the main culprits.

Newly-discovered Android malware steals banking passwords and 2FA codes

Security researchers at Cybereason are warning of a new mobile banking trojan that steals details from financial apps and intercepts SMS messages to bypass two-factor authentication mechanisms. According to experts who have examined the code of the malware, known as EventBot, it differs substantially from previously known Android malware – suggesting that it might be written by a new group of cybercriminals.

Free Go Module Vulnerability Scanning in Visual Studio Code

If you’re a Golang developer using Visual Studio Code, keeping at-risk Go Modules out of your apps just got easier, and for free. Today we’re announcing a new version of the JFrog extension for VS Code, available for free download. This integration brings live vulnerability information about every public Go Module you’re using directly into your source editor from the rich metadata of JFrog GoCenter.

Your Employees Are Superheroes, but This Superpower Might Be a Security Risk

Many people are working from home (WFH) now and will be for at least the next few weeks. The VPN and TLS connections that remote workers rely on allow for secure access, and although these are not new connection types to monitor, the current WFH situation has created a significant increase in the number of these connections you must monitor. This new WFH scenario has made one thing easier: mobile users are no longer mobile.

How to SSH into a Self-driving Vehicle

Over the last couple of years, we’ve started to see computers take to the street, and lucky for us, it’s been mostly to help us get deliveries or transport us around. These robots are a combination of sensors, compute units, and some form of connectivity. They have personalities, and if you look closely, two cute eyes on Postmates’ Serve that provide it with stereo vision to navigate the streets.

Observability: What You Need to Know

Observability has recently become quite the buzzword, populating headlines in DevOps and IT publications. Industry experts like Charity Majors, CTO and co-founder of Honeycomb, and Cindy Sridharan, to name a few, have been spreading the word about the importance of observability, making it clear that it’s more than just a passing trend, it’s an approach that DevOps organizations need to adopt.

How to Do Cyber Forensic Investigation with SOAR?

The incident response process is incomplete unless the cyber forensic investigation takes place. In fact, forensic investigation helps in identifying the causes of the attack and the main culprits behind the attack. Usually, the Computer Security Incident Response Team (CSIRT) has to gather forensic details such as logs or artifacts in the aftermath of the incident.

What Compliance Lessons Can We Learn From Past Pandemics?

COVID-19 has us reeling from health, social, and economic shocks, but this isn’t our first global crisis. It is, however, the first in which cybercrime plays a starring role. The world has faced several pandemics in the past 100 years—several influenza pandemics including swine flu (H1N1) and Avian, or bird, flu, and HIV/AIDS—as well as economic depression and a number of recessions.