Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Q1 2023 Threat Landscape Report: Ransomware Groups Splinter, Swarm Professional Services

Kroll’s findings for Q1 2023 highlight fragmented threat actor groups and a continued evolution in attack methods and approaches, which, alongside other key shifts in behavior, have concerning implications for organizations in many sectors. In Q1 2023, Kroll observed a 57% increase in the overall targeting of the professional services sector from the end of 2022.

Watershed Moment for Responsible AI or Just Another Conversation Starter?

The Biden Administration’s recent moves to promote “responsible innovation” in artificial intelligence may not fully satiate the appetites of AI enthusiasts or defuse the fears of AI skeptics. But the moves do appear to at least start to form a long-awaited framework for the ongoing development of one of the more controversial technologies impacting people’s daily lives. The May 4 announcement included three pieces of news.

INETCO's Ali Solehdin Talks EBT Fraud Prevention and AI with The Center Square

Scott McClallen – Staff Reporter – The Center Square (The Center Square) – Nationwide, electronic benefits transfer fraud is estimated to cost taxpayers up to $4.7 billion annually, according to the Government Accountability Office. In 2022, the Supplemental Nutrition Assistance Program distributed over $113.7 billion to nearly 22 million households. The federal government entrusts states to reduce fraud in safety net programs. In March, the U.S.

Snyk Hierarchy Best Practices - More than Groups and Orgs

What can startups and large enterprises have in common? Different organizational structures that cause friction when bringing in and rolling out a new tool. If you are familiar with Snyk, you’ll know that Groups can hold many organizations, and Organizations contain Projects. But that does not stop there… Each node in the organizational layer has different reporting, access control as well as security and license policy settings.

Detection strategies to unmask the source of malicious code

Having malicious code detection strategies in place is critical to keeping your software supply chain secure. Let’s imagine you discover a string of suspicious code within one of your applications. Perhaps a routine scan by your application testing team finds a point of interest that indicates malicious code, such as a time bomb or back door, has been inserted by a malicious insider within your software supply chain.

Eliminate malicious code in your software supply chain

What is malicious code? What makes it dangerous? Learn how can you detect it and keep it out of your software supply chain. Everyone wants to believe that the code developed within a trusted software supply chain is legitimate. The unfortunate reality is that malicious coders have subtle ways to secretly embed code that exposes your business to risk. Malicious code can be challenging to recognize and can remain undetected within applications long before it causes damage. Learn to recognize the red flags.

Cultivating a Culture of Security: Making Cybersecurity Everyone's Responsibility

Join renowned cybersecurity expert Paul Dwyer in this compelling video as he highlights the urgent need for a cultural shift toward security consciousness. In today's digital landscape, organizations, and individuals often perceive security as a cumbersome inconvenience. Paul delves into the reasons behind this mindset, emphasizing the importance of understanding why security matters.