Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

5 Signs You Have the Remote Access VPN Blues

As the pandemic wears on, and return to work plans continue to shift and morph, there’s really never been a better time to re-evaluate how your organization is handling remote access. Your hastily put-together VPN setup may have gotten the job done in the early days of lockdown, but is it really ready to protect a hybrid workforce that’s now used to flexibility and choice? Here are five signs that it might be time to reconsider your remote access VPN.

What is SASE (Secure Access Service Edge)?

SASE (Secure Access Service Edge) is a network architecture that unifies network and security solutions into a cloud-based service to enhance accessibility, efficiency, and cybersecurity. The concept of SASE was introduced in Gartner's 2019 report 'The Future of Network Security Is in the Cloud'. The concept emerged from organizations' increasing demand for reliable access across transforming network approaches.

The Callback is Coming From Inside the House

This bone-chilling webinar will cover: A spine-tingling hands-on-keyboard scenario of a motivated and capable insider threat working with the ghoulish adversary. Use of realistic and terrifying exploits and offensive security tools to simulate adversary TTPs, and how organizations are able to hunt for them. A practical threat hunting session demonstrating true behavioral hunting that walks participants through not only how the attack was carried out, but also how they can hunt for this insidious behavior in their own environments.

PAM: A Modern Approach

This short video explains how to thwart cyberattacks by eliminating privileged accounts using a modern approach to privileged access management. To learn more about managing privileged accounts, visit netwrix.com/pam. Traditionally, businesses have maintained dozens or even hundreds of privileged accounts to support critical IT administration activities. These powerful credentials pose a major security risk because they can be stolen by attackers or misused by their owners, either unintentionally or intentionally.

Cybersecurity Awareness Month: Top Trends Impacting Your Applications

It’s always important to take a pause to evaluate your software security – and what better time to do that than during Cybersecurity Awareness Month? To help get you thinking, we’ve compiled a list of cybersecurity trends that are happening now and will likely continue throughout the next several years. 1. Ubiquitous Connectivity: We are quickly moving to a world where everyone and everything is connected. Most software is internet-connected, as are most devices.

Software Composition Analysis Mitigates Systemic Risk in the Popular NPM Repository

Chris Wysopal, Veracode Chief Technology Officer and Co-Founder, recently sat down to discuss the open source supply chain attack on the popular npm repository. Below is the transcript and corresponding video of his reaction. Just a few days ago, we saw a classic open source supply chain attack where someone modified a JavaScript library, UA-Parser-JS, which is in the npm repository.

October Release Rollup: New Anomaly Detection, UX Features

We’re excited to share several recent user experience improvements we’ve made across the platform, including multivariate anomaly detection and other new features aimed at improving content governance. Continue reading to learn about some of our top product releases for October.

A Definitive Guide to Security Analytics

Security analytics has become an increasingly popular field as more and more organizations take a different tact to cybersecurity. Historically, IT teams focused on prevention and protection, but today’s priority is detection. Hackers tend to use a wide range of ever-changing tools to exploit vulnerabilities. It can feel like whack-a-mole to constantly try to defend against evolving threats.

Real-time Fraud Detection: Are You Ready for 2022?

It’s a sure sign that year-end is fast approaching when stores start to display their holiday merchandise and decorations before Hallowe’en is even over. As you start planning for a successful 2022, and focus on payment security and frictionless customer experience, consider the global financial, regulatory and economic factors that will impact your business.

What is a DDoS Attack & How to Protect Your Site

Cybersecurity threats evolve constantly, and it’s difficult for any organization to stay ahead of emerging risks. A company’s best defense against security breaches is to understand the tactics that hackers use, and then plan accordingly. In this post we’ll examine one of the common kinds of cyber attacks — a DDoS attack — and discuss how best to protect your network infrastructure.