Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Corporate Reputation | NED Webinar Series - Part 1: External Threats

In partnership with The Non-Executive Directors Association (NEDA) Our three-part webinar series on the current risk landscape and emerging threats/opportunities features speakers from Kroll, NEDA, and a range of experts and seasoned non-executive directors (NEDs). Reputation is everything, and as we contemplate life beyond COVID-19 crisis management, Kroll executives have been considering a range of contemporaneous risks that should be on every board’s agenda. They’re even evaluating how failure to consider these risks can impact a company’s corporate reputation.

AppSec with LolCats: Click2Cat - the Security Extension to Veracode You Didn't Realize You Needed

Fixing security findings in your code can be hard. Sometimes you need help from other developers who have solved these problems before. Veracode provides one-on-one time with ex-developers who can coach you through different approaches to address security findings. But sometimes, you don’t really want advice. Instead, you need a boost to help you get through the day of reducing risk in your software.

Report: USB threats to ICS systems have nearly doubled

The latest Honeywell USB Threat Report 2020 indicates that the number of threats specifically targeting Operational Technology systems has nearly doubled from 16% to 28%, while the number of threats capable of disrupting those systems rose from 26% to 59% over the same period. Let’s face it. Critical infrastructure operators in manufacturing, aerospace, energy, shipping, chemical, oil and gas, pulp and paper, water and wastewater, and building automation are heavily relying on USB devices.

Federal agencies given five days to find hacked Exchange servers

CISA, the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, has told federal agencies that they have until 12:00pm EDT on Monday April 5 to scan their networks for evidence of intrusion by malicious actors, and report back the results. CISA is ordering agencies with on-premises Microsoft Exchange servers to urgently conduct the scans following widespread exploitation of vulnerabilities, in fear that some compromises may have remained undetected.

Five worthy reads: The unexpected costs following a cyberattack

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the worst data breaches that happened recently, their impact, and the cost of data breaches for companies. The COVID-19 pandemic has not only had an impact on the mental and physical health of employees, but on the digital health of organizations around the world.

Application security automation for GitHub repositories with Snyk

Snyk provides a wide array of integrations and a pretty comprehensive API to enable you to deploy Snyk across the SDLC and monitor all the code your organization is developing. Of course – this is not always simple. At scale, ensuring Snyk is monitoring all your repositories becomes more challenging. As you grow, more code is added in the shape of new repositories. Not only that, existing repositories keep on changing.

Episode 12 | Employee Training in a Virtual Environment

The pandemic has resulted in changing infrastructure for providing training to employees in this work from home limitation of large gatherings environment. This episode will feature a special guest to discuss how we partner to bring the highest level of security training to our clients – in a high-tech manner that we believe is best in class and exceedingly useful in today's environment.