Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Mobile interface make it easy scammers to phish you

With a smaller screen, developers are forced to create simplified interfaces on your tablets and smartphones. But this also makes it easy for scammers to hide telltale signs of a phishing link. Aaron Cockerill and Mike Banic of Lookout talks about why we're more vulnerable to phishing when using a mobile device.

How Clorox leverages Cloud SIEM across security operations, threat hunting, and IT Ops

During Sumo Logic’s Illuminate user conference, Heath Hendrickson, senior security architect at the Clorox company, and Gary Conner, senior threat protection lead, presented how they are leveraging Sumo Logic across security operations, threat hunting, IT operations, and more.

Announcing Veracode in AWS Marketplace: Streamlining Secure Software Development for AWS Customers

Digital transformation continues to accelerate, and with it, businesses continue to modernize their technological environments, leveraging developer-first cloud-native solutions to build, host, and secure their software. At Veracode, we continue to see customers leveraging large cloud providers, such as AWS, as a central platform to conduct these activities.

Nature vs. Nurture Tip 3: Employ SCA With SAST

For this year’s State of Software Security v11 (SOSS) report, we examined how both the “nature” of applications and how we “nurture” them contribute to the time it takes to close out a security flaw. We found that the “nature” of applications – like size or age – can have a negative effect on how long it takes to remediate a security flaw.

Key Elements of a Cybersecurity Strategy

The Verizon Payment Security Report is a must-read for data security professionals, and the 2020 report is no exception. The theme of this year's report is 'Strategy.' In this quick video, Tripwire's Sr. Manager of R&D Anthony Israel-Davis digs a little deeper into the overarching theme—what strategy means when it comes to cybersecurity.

NIST SP 800-128 - Because Patching May Never Fix Your Hidden Flaws

Over the last few years, the idea of patching systems to correct flaws has graduated from an annoying business disruption to a top priority. With all of the notorious vulnerabilities that can wreak total havoc, the time it takes to patch becomes a minor inconvenience when weighed against both the technical challenges and possible regulatory penalties of not patching.