Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

What is SaaS? Hint: It Doesn't Mean "Cloud"

The U.S. federal government is committed to implementing zero-trust cybersecurity across all government agencies. In 2021, the White House issued Executive Order (EO) 14028, directing federal agencies to adopt zero-trust network architectures. A few months later, CISA followed up with a draft Zero Trust Maturity Model.

Curating Open source Libraries on JFrog Platform, part II.

Software supply chain security has been the most widely discussed topic for anyone who is writing applications utilizing the majority of open-source or third-party libraries. This webinar will showcase JFrog Platform's abilities to curate and compose workflows to help isolate libraries that have vulnerabilities and promote libraries to repositories that can be safely used. This webinar will also demonstrate self-service curation workflows.

AI, Cybersecurity, and Emerging Regulations

The SecurityScorecard team has just returned from an exciting week in San Francisco at RSA Conference 2023. This year’s theme, “Stronger Together,” was meant to encourage collaboration and remind attendees that when it comes to cybersecurity, no one goes it alone. Building on each other’s diverse knowledge and skills is what creates breakthroughs.

Crypto is Being Stolen Via Compromised AT&T Email Accounts

Communications company AT&T offers email services to many of its customers. Those emails have recently been compromised by way of an interesting exploit that is costing customers millions of dollars in stolen cryptocurrency. AT&T customers are having their email accounts attacked, and those exploited email accounts are being used to steal additional data and to access cryptocurrency exchange accounts, which is a very serious issue for the impacted users.

Mastering Cyber Security - Overcoming Professional Challenges

Part 1 – Overcoming professional challenges Despite the high demand for information security professionals, the path to a successful career in this field is not without its challenges. Those who choose to pursue a career in information security must be prepared to face a range of difficulties and obstacles, from the pressure to stay up-to-date with the latest technology and trends, to the constant threat of cyber attacks.

5 Reasons to Implement Third-Party Risk Management Software

According to a 2022 Gartner survey, 84 percent of executive risk committee members say that “misses” in third-party risk resulted in disruption to their business operations. That statistic is alarming, considering that most enterprise organizations have extensive third-party relationships with vendors, suppliers, and partners for business innovation or operational efficiency.

Splunk SOAR Playbook of the Month: Tackling Phishing Attempts with Identifier Reputation Analysis

Security professionals have become all too familiar with the threat posed by phishing. Whether it’s a convincing looking email asking an employee to click a link to update their login credentials or a surprise text from the CEO asking them to send over gift card codes for a customer, phishing attacks have only continued to grow over the years. For 2023 alone, 33 million data records are expected to be compromised due to phishing attacks.

Cybertalk with Bill and Robin - 3rd April 2023 - The RSA Roundup

Join Bill Carter and Robin Johns as we learn what's happening in the world of CyberSecurity. Last week Bill was at the RSA Conference, where there were over 50,000 attendees and multiple security vendors present. But what topics were on the hears and minds of those who visited? Learn about the 'top 5' items which are currently concerning, and exciting, security practitioners in this latest episode.

Best Practices for File Sharing in Hybrid Work Environments

The move to hybrid work environments came suddenly for some organizations, while for others, it had been building incrementally. Regardless of how it happened, few came to it with a strategic plan for how IT would handle it. The result has been myriad challenges that span the physical and digital. On the digital front, one of the biggest challenges is related to secure file sharing.