Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Uplevel your supply chain risk management

We’ve entered Week #3 of National Supply Chain Integrity Month, an initiative that CISA and other government agencies started to highlight the importance of securing our nation’s most critical systems and ensuring they stay resilient. For Weeks #1 and #2, I wrote about maturing your third-party risk management program and securing the small business supply chain.

What is Fourth-Party Risk Management (FPRM)?

Fourth-party risk management is the process of identifying, assessing, and mitigating the cybersecurity risks posed by the vendors of your third-party vendors (your vendor’s vendors). With digital transformation compressing the boundaries between IT ecosystems, any of your vendors could be transformed from trusted suppliers to critical data breach attack vectors if they’re compromised.

Under the Wing: Protecting Small Businesses Against Big Attacks

70% of all cyberattacks target small to midsize businesses. Adversaries know that most small businesses don’t have the time, tools or staff to go head to head against today’s threats. In this episode, learn how fast, simple and affordable it can be to protect your business.

SOAR is Dead. Why HYPERAUTOMATION is What's Next.

Today, Torq transformed security automation forever with the debut of the world’s first enterprise-grade security hyperautomation platform. Why does that matter? I’ll let Gartner explain. It says “Hyperautomation is a business-driven, disciplined approach that organizations use to rapidly identify, vet, and automate as many business and IT processes as possible.” Simply put, it’s the future of security automation, and we’re delivering on its promise, today.

Secure by default: recommendations from the CISA's newest guide, and how Cloudflare follows these principles to keep you secure

When you buy a new house, you shouldn’t have to worry that everyone in the city can unlock your front door with a universal key before you change the lock. You also shouldn’t have to walk around the house with a screwdriver and tighten the window locks and back door so that intruders can’t pry them open.

11:11 Systems' CTO shares insight into Oakland's ransomware attack

The city of Oakland was victim of a ransomware attack, gaining access to city services, employee information, payroll, and more. TVU Fox 2 interviewed Justin Giardina, Chief Technical Officer of 11:11 Systems, and asked him to share insight into the cybersecurity situation.

A CISOs Guide To The New 2023 OWASP API Security Update

The OWASP API Security Project team recently posted the Top-10 API risks Release Candidate (RC) for 2023. Last updated in 2019, this new version is designed to help organizations understand the top threats against APIs and how to secure them. In this webinar, we will dig into the OWASP API Security Top-10 2023RC and discuss: We will share some of our data-driven insights, derived from our quarterly API ThreatStats(tm) Reports, and show how you can protect your APIs in real-time from the most impactful API threats.

A Practitioner's Guide to the New 2023 OWASP API Security Update

The OWASP API Security Top-10 risks Release Candidate (RC) is now out for comment. This new version is designed to update your understanding of the top threats against APIs and how to secure them. In this deep-dive webinar, we will dig into each of the OWASP API Security Top-10 2023 RC risks and discuss: The focus of this 2nd webinar in the series will be on what practitioners – builders, breakers, defenders, and DevSecOps – need to know to better protect their APIs.

Demo: Introducing A10 Next-Gen WAF, Powered by Fastly

A10 Next-Gen WAF, powered by Fastly, leverages advanced technology to protect web applications from complex modern threats while minimizing false positives and ensuring availability. See how our integrated Next-Gen WAF, enabled on Thunder ADC, effectively blocks attacks while remaining user-friendly. Get insights into its visibility, DevOps, security tool integrations, and analytics features for advanced web application protection.