Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Disruption on the horizon

Innovations in technology have been a prime agent for disruption throughout much of human history. Advancements in materials science gave English archers, with their superior longbows, the advantage over the French in many conflicts during the Hundred Years War; such as the Battle of Agincourt. In the late 2000’s, the music industry was forced to reinvent itself in the face of changing consumer consumption models as a result of technological advancements or become irrelevant.

Create Login Scripts with Selenium

In this video, you will learn how to use the Selenium IDE plugin to create a login sequence script that enables Veracode Dynamic Analysis to scan URLs that have form-based authentication. Veracode Dynamic Analysis delivers an automated capability to scan your web applications based on the URLs that you provide. If your website uses form-based authentication (a more complex login procedure than a user name and password, such as a token key or two-step authentication), you must upload a login script to your Dynamic Analysis so that Veracode can log in to application.

'Glitch' in Illinois' PUA System Blamed for Exposing SSNs, Private Data

Government officials said that a glitch in the State of Illinois’ Pandemic Unemployment Assistance (PUA) program exposed thousands of people’s Social Security Numbers (SSNs) and other private data. Jordan Abudayyeh, a spokesperson for Illinois Governor J. B. Pritzer, sent a statement to WBEZ on May 16. In it, she revealed that the Illinois Department of Employment Security (IDES) had learned of a security incident involving its PUA program. As quoted by WBEZ.

Legal Risks and Recommendations for Employee Workplace Surveillance in the US

Monitoring employees is one way to ensure a productive and secure workflow within an organization. However, not all employees like being watched. Some even challenge the ethics and legality of workplace surveillance. In this article, we explore the nature of workplace surveillance and consider the laws US employers should know and follow if they want to monitor their employees.