Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

What is data loss prevention?

DLP security strategies, benefits explained The threat landscape is a constantly evolving challenge for enterprise security professionals – the number of cyberattacks is continuing to rise, data exfiltration is now included in 70% of ransomware attacks, and insiders are responsible for 30% of all data breaches. As a result, enterprises are constantly looking for ways to reduce the risk of sensitive data being leaked outside the company.

Detectify Research Team releases Ugly Duckling, a web scanner for hackers

STOCKHOLM, SWEDEN – the Detectify Security Research team announced the general availability of Ugly Duckling, a stand-alone application security tool specifically tailored for ethical hackers to make it easier for them to share their latest findings. This new open-source scanner was developed with the Detectify Crowdsource community hackers in mind, and it is available for any security enthusiasts to tinker with as well.

Styra raises Series B to Drive Cloud-native AuthZ

In November 2019, just after Styra raised $14 million in our Series A funding round, I wrote that the market’s move away from monolithic apps and adoption of containerized cloud-native application architectures was going to provide “a substantial market opportunity for policy and authorization to evolve.” A lot has happened since I wrote that, and I’m happy to report that while our Series A round showed the market opportunity, our latest round of funding proves the validity of t

Exploring intent-based Android security vulnerabilities on Google Play

Our phones know a lot about us, so it’s important we can trust them. After discovering and then publishing our findings on SourMint — the malicious iOS ad SDK — the Snyk Security Team decided to dig deeper in the Android ecosystem. To do so, we leveraged Snyk Code to analyze and search for vulnerabilities in applications uploaded to the Google Play store.

Threat Intelligence, Integration and Automation in a Modern SOC

As organizations continue to evolve their security operations maturity and the SOC increasingly focuses on detection and response, three capabilities are foundational for success – threat intelligence, integration and automation. In a recent webinar, “Evolution of CTI – Use Case in a Modern SOC,” ThreatQuotient’s Yann Le Borgne, together with Ben van Ditmars of Atos and Martin Ohl from McAfee tackle this topic.

What is a DDoS Attack and How Does it Work?

A Distributed Denial of Service (DDoS) attack, is an illegal attempt to make a website unavailable by overloading its server with high amounts of fake traffic. The onslaught of malicious connection requests places legitimate visitors at the back of an undiminishing traffic queue which prevents the website from loading.

BrowseControl Web Content Filtering Software - Block Websites & Applications | CurrentWare

Don’t let internet abuse run rampant in your organization. Take back control over web browsing with a free trial of BrowseControl. BrowseControl is an easy-to-use web content filtering software that helps organizations enforce policies, improve productivity, reduce bandwidth consumption, and meet compliance requirements - no matter where their users are located.

BrowseReporter User Activity Monitoring Software - Track Internet & Application Use | CurrentWare

Ready to make data-informed decisions? Get actionable insights into the activity of your users with a free trial of BrowseReporter. BrowseReporter is a versatile computer monitoring software (employee tracking software) that helps organizations enforce policies, meet compliance requirements, and understand how their users operate - no matter where they’re located.

AccessPatrol USB Device Control Software Overview - USB Data Loss Prevention | CurrentWare

Don’t let a preventable data leak ruin your organization. Take back control over portable storage devices with a free trial of AccessPatrol. AccessPatrol is a device control software solution for preventing data loss to portable storage devices. In this video CurrentWare's managing director Neel Lukka provides an overview of the features available in AccessPatrol.