Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Applying Zero Trust to Security Service Edge (SSE)

The current situation with legacy on-premises security defenses trying to support a hybrid work environment and zero trust principles is challenging for companies. Complications can include poor user experience, complexity of disjointed solutions, high cost of operations, and increased security risks with potential data exposure. Simple allow and deny controls lack an understanding of transactional risk to adapt policy controls and provide real-time coaching to users.

What is a Third-Party Risk Assessment in Cybersecurity?

A third-party risk assessment pulls risk vendor risk data to help cybersecurity teams understand how to best mitigate supplier risks. Though the field of Third-Party Risk Management (TPRM) is evolving to prioritize compliance, security, and supply chain risk, third-party risk assessments could also be used to uncover an organization’s exposure to financial, operational, and reputational risks stemming from its third-party network. Learn how UpGuard streamlines Third-Party Risk Management >

AWS WAF vs. AppTrana WAF

AWS WAF, a widely used security tool from Amazon Web Services, is a web application firewall designed to safeguard web application servers against various online threats. The tight integration of AWS WAF with key AWS services, including Amazon CloudFront CDN, Application Load Balancer (ALB), and Amazon API Gateway, ensures a comprehensive security approach. AWS WAF can also protect services offered by other providers as long as the content is delivered via the CloudFront distribution network.

2024 RSA Recap: Centering on Cyber Resilience

Cyber resilience is becoming increasingly complex to achieve with the changing nature of computing. Appropriate for this year’s conference theme, organizations are exploring “the art of the possible”, ushering in an era of dynamic computing as they explore new technologies. Simultaneously, as innovation expands and computing becomes more dynamic, more threats become possible – thus, the approach to securing business environments must also evolve.

How to Protect Your Business From API Data Leaks

Application Programming Interfaces (APIs) are rapidly becoming the primary attack vector for cloud native applications. In fact, according to one study, 92% of organizations have already experienced a security incident resulting from insecure APIs. This is because loosely coupled microservices predominantly intercommunicate via APIs. In this video, we will analyze a ‘ripped from the headlines’ case-study example of data leakage via insecure APIs. Then we will examine various API vulnerabilities that can be exploited by attackers to enable data leaks, including Broken User Authentication (BUA), Broken Object Level Authentication (BOLA), and Broken Function-Level Authentication (BFLA).

Using Trustwave DbProtect and Offensive Security Solutions to Protect Against Nation-State Cyber Threats

The US Director of National Intelligence (DNI) earlier this month gave a stark warning to the Senate Armed Services Committee detailing the cyberthreats arrayed against the US and the world from China, Russia, North Korea, and Iran.

Episode 4: Enhance your PEDM strategy with PAM360's advanced privilege elevation controls

In the fourth episode, we will uncover all the granular privilege elevation controls offered by PAM360, including real-time risk assessment, application and command controls, and end-to-end management of endpoint privileges. Join us to explore PAM360's advanced privilege elevation controls—complete with customizable options—and learn how to maximize their effectiveness for your needs. By the end of this episode, you will have a complete understanding of.

Cyber Threat Intelligence Update: Data Breach, Ransomware Trends, and Emerging AI Threats

This blog provides a comprehensive update on a major data breach at the UK Ministry of Defence, a strategic shift in ransomware targets towards smaller businesses, and the increasing utilisation of generative AI in cybercrime.