Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Secure remote access explained

As the business world adjusts to the chaotic landscape of today’s economy, securing access from remote devices and endpoints has never been more critical. Equally critical is the requirement for organizations and their employees to practice good security hygiene. With the rising number of endpoints (laptops, servers, tablets, smartphones) requiring access to corporate networks, the range of attackable targets for malicious actors has broadened substantially.

Why is Dynamic Analysis an Important Part of Your AppSec Mix?

By now, most are familiar with the concept of DevSecOps. With DevSecOps, application security (AppSec) is moved to the beginning of the software development lifecycle (SDLC). By scanning earlier in the SDLC, you are able to find and fix flaws earlier. This can result in significant time and cost savings. Most organizations understand the importance of static analysis, which scans for flaws during development, but dynamic application security testing (DAST) is just as important.

What is Corporate Espionage?

The term “espionage” often brings images of double agents and covert undercover missions to mind. This is how espionage is depicted in the movies, but in real life, it can take on many other forms. Businesses may not need to worry about James Bond spying on their company, but they should be concerned about corporate espionage. Corporate espionage, often referred to as industrial espionage, is the practice of spying for financial or commercial gain.

Unfolding the Twitter security incident

In case 2020 wasn’t dystopian enough, here’s some more unbelievable news. On July 15, 2020, social media giant Twitter admitted it fell victim to a security breach. The attackers targetted 130 Twitter accounts, including several belonging to high-profile individuals such as elected officials; former president Barack Obama; and business leaders including Bill Gates, Jeff Bezos, and Elon Musk.

Featured Post

The ISO 9000 Family As It Relates To Operations

In a world where customers gravitate towards the best products and services, upholding high levels of quality as a business is a no-brainer. Being quality-centric in all your business processes ensures you can steer away from common errors. It can also improve your overall productivity as well as improve your customer retention rates. While there are various standards you can follow to improve the quality of your daily operations, the ISO 9000 standard remains to be one of the best. Even better, it is recognized globally, which could make it easier to do business the world over. The ISO 9000 family consists of five standards.

Finding problems that matter

See their previous blog for more! Towards the end of the 19th century, large cities like New York were facing a vexing problem so devastating that many questioned whether such cities could be sustained at all. People could no longer cross the street without assistance, stumbling was a common problem, disease was spreading, and even those issues had nothing on the horrendous stench emanating from every corner. We are talking, of course, about horse manure.

Dynamic Application Security Testing: DAST Basics

Application security testing (AST), which are tools that automate the testing, analyzing, and reporting of security vulnerabilities, is an indispensable part of software development. In a modern DevOps framework where security is shifted left, AST should be thought of as compulsory. And this has never been more important when you consider that Forrester reports the most common external attack method continues to be application weaknesses and software vulnerabilities.