Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

AT&T Cybersecurity Insights Report: Focus Energy and Utilities

As energy and utilities companies strive to use the edge to innovate new solutions for delivering more efficient and resilient services, cybersecurity risks to carrying out those business missions loom large. Ransomware attackers and other cybercriminals have increasingly found energy and utilities organizations a profitable target, lobbying high-profile attacks in the last few years that have threatened safety and uptime in the process.

CVE-2022-3602 and CVE-2022-3786 - High-severity OpenSSL Vulnerabilities Finally Published

On October 25th, The OpenSSL team announced that OpenSSL 3.0.7 will contain a fix for a critical severity vulnerability that affects OpenSSL 3.x. The full details about the vulnerability were held in an embargo until November 1st. Due to the rarity of an OpenSSL critical-severity issue and the overwhelming popularity of OpenSSL, social media was flooded with messages about this issue, expecting a “Log4Shell”-level event.

BYOD and Phishing Attacks: Top Threats Facing U.S. Government Organizations

Telework has become a mainstay, and with it, so has employee reliance on personal mobile devices. These devices are difficult to monitor and keep up to date, presenting a unique security challenge for U.S. local, state, and federal government organizations.

Digital ID in NZ, Austria, & Japan- Why Online Identification Matters

Controlling information leakage is one of the top digital ID advantages for people’s privacy. It is also known as “selective disclosure,” and it is something that all digital ID adapters regard to be critical for user privacy. However, a closer examination reveals that such a system might result in a digital trail of where and when a license is displayed, possibly allowing governments or corporations to follow people or their transactions.

Complete Guide on Comodo Code Signing Certificate

Comodo is a cybersecurity solutions provider helping businesses and individuals stay protected from all sorts of cyber threats. It provides verdict processing, digital certificates, endpoint protection, helps organizations implement and monitor their network security policies, and much more. Among its digital certificates, Comodo also provides code signing certificates to developers and development companies.

Tales from Tracking Cybercriminals | Cybersecurity Sessions Bonus Episode

Illicit forums and dark web marketplaces are so closely guarded that it’s almost impossible to know how many stolen user accounts, digital assets, or data leaks are exposed, let alone who is responsible. But the more we can uncover, the better we can defend against attacks and hold threat actors accountable.

Stranger Danger: Your JavaScript Attack Surface Just Got Bigger

Building JavaScript applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome - you're a cloud native application developer! As developers, our responsibility has broadened, and more software means more software security concerns for us to address.

4 Steps for Defining Data Classification Levels and Policies

Data classification is an important business process. It makes it easier to apply data protection, helps employees understand what data is sensitive, and, importantly, which data can be made public. Unfortunately, many organizations provide employees with access to far more data than is needed. The oversharing of information with employees is a huge security risk.

Synopsys Action introduces GitHub Actions integration for developers

GitHub Actions integrates AST capabilities into development workflows and CI/CD pipelines to provide instant, actionable insights into risks. Today, the nature of technology and its accelerated time to market require organizations to extend security practices to development and engineering teams.

Does cloud log management shield you from threats? CloudTrail vs CloudWatch

What is different about cloud log management versus on-premises? The answer may seem simple, but several elements such as CloudTrail vs. CloudWatch come into play. In this article, we will cover some of the most important differences, and then dig deeper into a specific example of AWS CloudTrail vs. CloudWatch.