Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

How to manage new threats unleashed by the Internet of Things

From TVs to fridges to energy meters, more and more of the items we use every day are now smart devices. 87% of US households have at least one smart TV, up from 50% in 2014. And with ownership of smart speakers, thermostats, lights, and security systems also on the rise, it’s expected that smart homes will soon become the norm. This ever-expanding network of smart devices is known as the Internet of Things (IoT).

Testing resiliency against malicious package attacks: a double-edged sword?

The JFrog Security research team continuously monitors popular open-source software (OSS) repositories with our automated tooling to avert potential software supply chain security threats, and reports any vulnerabilities or malicious packages discovered to repository maintainers and the wider community. At times, we notice trends that are worth analyzing and learning from.

The Great Cybersecurity Resignation

In 2022, the buzz phrase of the year has to be “The Great Resignation”. What is it? It’s a term coined to describe the current rise in people leaving their employer to find work elsewhere. But people have always moved on, right? Of course they have. Staff retention rates have always been a target for most HR functions. But something is different in 2022. More people are leaving organisations quicker than they did previously.

How to Use Your Last Breach to Justify Security Spend

I recently wrote a blog post outlining what to do in the first 24 hours after you have been breached, and in my conclusion I mentioned that capturing the incident in a case study could help unlock budget in future. Today, I want to look at this in more detail, and consider the approaches you can take to analyse the cost of a breach in order to make a request for appropriate preventative spend.

NeoSystems & Deltek Join Forces to Deliver Services in the Cloud

RESTON, Va., July 12, 2022 – NeoSystems, a full-service strategic outsourcer, IT systems integrator and managed services provider to the government contracting market, is once again joining forces with Deltek, the leading global provider of software and solutions for project-based businesses.

How to Detect and Prevent Ransomware Attacks?

As the cyber world grows day by day and makes our lives easier and more efficient, hidden threats and risks also increase. One of them is Ransomware, an expensive and ever-growing cyber threat on organizations’ critical data, files, or any other critical information from the past few years. Here the victim pays the ransom amount for his data locked by the attacker.

5 Common blind spots that make you vulnerable to supply chain attacks

Over the past several years, hackers have gone from targeting only companies to also targeting their supply chain. One area of particular vulnerability is company software supply chains, which are becoming an increasingly common method of gaining access to valuable business information. A study by Gartner predicted that by 2025, 45% of companies will have experienced a supply chain attack.