Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

What are the Components of an Excellent Offensive Security Program

In the dynamic world of cybersecurity, creating an effective offensive security program is paramount for organizations seeking to proactively identify and mitigate potential threats. An offensive security program encompasses a suite of strategic components designed to test and strengthen an organization's defenses. An effective offensive security program includes various components, such as penetration testing, red/purple teaming, managed vulnerability scanning, and bug bounty programs, to name a few.

How GitGuardian Enhanced Vermeer's Software Development Security

In the rapidly evolving world of software development, maintaining robust security protocols is paramount. For Vermeer Corporation, a leading manufacturer of large agricultural and industrial machinery, embedding security into their software development lifecycle was a significant challenge. That is until they discovered GitGuardian. CJ May, a senior IT Security Analyst at Vermeer Corporation, shared his experience of integrating GitGuardian into their software development process. He described the tool as "invaluable for any security program.".

Revolutionizing Security: The Modular Approach with Brivo

In today's fast-paced world, security is more critical than ever. But how can we ensure that our security solutions are not just robust but also flexible and scalable? Enter Brivo, a leader in modular security solutions that are changing the game. In this video, we dive deep into Brivo's innovative approach to security, focusing on cloud-based systems that prioritize identification, management, and containment of risks and failures. Discover how Brivo stands out with its modular solutions, offering unparalleled flexibility and efficiency.

The Evolution of Honeypots: From Traps to Intelligence Tools | Razorthorn Security

Robert Black discusses the historical and modern uses of honeypots in cybersecurity. Initially designed as traps, these tools now serve as valuable sources of intelligence, helping organizations understand attacker behaviors and enhance defenses. Learn how deception technology has evolved over time.

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on significant cyber threats. This edition covers an alleged data breach at Ticketmaster, a cyberattack on Synnovis affecting London hospitals, and a data breach disclosed by the BBC. The full reports are available to CYMON users. Request access here.

A Salt Security Perspective on the 2024 Gartner Market Guide for API Protection

APIs are crucial for modern digital businesses because they allow different software systems to communicate and exchange data seamlessly and they are foundational to how modern applications are built. However, they are also vulnerable to cyberattacks because they are widely used. To address this growing threat, organizations are increasingly turning to API protection solutions to protect their valuable data and ensure uninterrupted business operations.

How to Choose the Right Exchange Online Backup Solution

This blog will explore essential factors to consider when selecting an Exchange online backup solution. Our goal is to equip you with the knowledge to make an informed decision tailored to your organization’s needs. Microsoft Exchange Online is a go-to choice for businesses. It offers a variety of features that enhance productivity, security, and accessibility.

Four Ways to Prevent Credential Theft and Credential-Based Attacks

When it comes to cybercrime, there are few tactics as useful and widespread as credential theft and the use of stolen credentials. In the 2023 breach of password management giant Okta, it was a set of credentials that jumpstarted the incident — threat actors hacked into an employee’s personal Google account, where they found an Okta customer service account had also been saved.