Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Detectify security updates for 17 June

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security researchers and Crowdsource ethical hacker community. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. This post highlights a few things that we have improved in the last two weeks.

Veracode Security Labs: Hands-On Training To Shift Application Security Knowledge Left - Demo

Veracode Security Labs shifts application security knowledge left, training developers to tackle modern threats in the evolving cybersecurity landscape by exploiting and patching real code, and applying DevSecOps principles to deliver secure code on time. Through hands-on labs that use modern web apps written in your chosen languages, developers learn the skills and strategies that are directly applicable to an organization's code. With detailed progress reporting, email assignments, and a leaderboard, developers are encouraged to continuously level up their secure coding skills. When development is empowered to fix security defects and reduce risk, security teams are better supported to scale AppSec programs, meet compliance requirements, and achieve business outcomes.

The COVID-19 Pandemic Dominates the Cybersecurity World

Cybersecurity is not a static world. You can say that it is a social system, it affects and is affected by its surrounding environment. For example, back in 2018, it was the GDPR that shook the foundations of security and privacy by making the protection of our personal data a fundamental human right. But that was then. What is shaping today’s cybersecurity? This is the question that the Infosecurity Magazine State of Cybersecurity 2020 report investigates.

What are the Benefits of a Security Risk Assessment?

Being an important part of cyber security practices, security risk assessment protects your organization from intruders, attackers and cyber criminals. In this article, we will discuss what it is and what benefits it offers. A significant portion of our business processes heavily rely on the Internet technologies. That is why cyber security is a very important practice for all organizations. Making up a crucial part of cyber security, security risk assessment is a topic that must not be overlooked.

Cybersecurity for small business supply chain management

Small businesses are significant contributors to the economy. According to the U.S. Small Administration, they generate approximately 44% of the gross domestic product (GDP) in the U.S. However, small to medium enterprises (SMEs) are also frequently more vulnerable to the threats of our contemporary digital landscape.

Cybersecurity Risk Assessment Tools You Can Rely on Year-round

Traditional cybersecurity risk management remediation efforts start with cybersecurity risk assessments and penetration testing. This commonly involved outsourcing to a consultant who would offer the assessment as a standalone service or as part of a larger risk management program. The issue is cyber risk assessments offered by third-parties only provide a point-in-time assessment of your (or your vendor's) security controls, an inaccurate measure of the true level of risk.