Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

NSA list: what you need to know about the top vulnerabilities currently targeted by Chinese hackers Part 2

In our previous blog we covered the first 10 of the NSA vulnerabilities currently targeted by Chinese hackers, here the remaining ones, again demonstrating the predictive power of our risk based vulnerability management tool Farsight

5 Tips for Training Non-IT Employees on Cybersecurity

In June, one research study found that the pandemic caused just over 40% of the entire US workforce to work from home full-time. Many businesses made the quick decision to allow employees to work remotely, scrambling to provide IT resources and remote-work tools on the fly. Now, many enterprises are doubling down and allowing employees to work from home for the foreseeable future.

Synthetic Monitoring

Testing uptime, response time, and other performance metrics in applications can take a few different shapes. One common technique is an approach known as synthetic monitoring. This form of performance monitoring doesn't rely on real users interacting with a service, and instead uses automated tools to mimic interactions. Then, the results are recorded and parsed just like other solutions.

Must-Have Features of a Modern SIEM

Initially, Security Information and Event Management (SIEM) solutions were readily adopted because of their capability to provide actionable insights into the deep corners of an organization’s network. Legacy SIEM systems helped in understanding when and where security incidents are happening in real-time. Soon enough, these SIEM systems faced an avalanche of false positives, and they required a dedicated team to filter out irrelevant alerts.

The Importance of User Behavior Analytics

There’s no question that cybercrimes are a growing problem for businesses in the United States. A cyberattack can cost a business about $200,000 on average. Sadly, many businesses that are targeted cannot recover from the financial effects of a cyberattack. In fact, it’s estimated that 60% of targeted companies go out of business within six months of the attack.

How The JFrog Platform Drives DevSecOps At Scale

With the JFrog Platform at the core of your DevSecOps tool chain, you will over achieve your deployment frequency and change lead time metrics. By integrating JFrog into your existing CI environment current skills (people) and processes are maximized, while aggregating all the commercial and open source software artifacts, dependencies and documentation for re-use across all of your development projects to drive consistency and quality of the build.

SPAM text messages vs SMiShing and defending against it

Businesses want to connect to their users and meet them where they are. One growing way to communicate to them is through text messages including providing coupons, recent news, and other marketing materials. When these marketing efforts are unwanted by the customer, this is when they cross the line into the SPAM category. SPAM has taken many forms throughout history such as junk mail in your mailbox and robocalls.

Indonesia Fintech Market - SWOT Analysis

The limitations of traditional lending solution creates a room for innovation via Fintech. Fintech is able to address the challenges that conventional lending providers face by utilising a combination of different business models, technology, and innovative approaches. Indonesia’s fintech market looks like an open bottle of honey to me. The fintech market has grown by 16.3% with total investment in fintech companies reaching $176.75 million in 2019.

How Netskope NewEdge Takes SD-WAN to the Next Level

With Gartner releasing its latest Magic Quadrant for WAN Edge Infrastructure earlier this month, it seemed an appropriate time to explore the intersection of SD-WAN and SASE. Both of these technological approaches hold great promise and are large, billion-dollar markets, sharing the common goal of connecting users to the data and applications critical to doing their job. The two technologies demonstrate the increasing overlap and tightening linkage between networking and security investments.