Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Bringing Veracode Fix to GitHub

If you’re an avid reader of Application Security surveys, analyst papers, or incident reports, you may have concluded that the biggest issue most organizations have with application security is NOT finding the flaws in their codebase, but is, in fact, finding ways to remediate them while also creating new applications and updates, oh and keeping the lights on. Many organizations are drowning in security debt.

What are patent trolls? How Cloudflare defeating Sable made patents public!

In this week’s episode, we look at patent trolls, what they are, and why a recent Cloudflare win also helps the industry to innovate. Host João Tomé is joined by Emily Terrell, Senior Legal Counsel, Litigation, and Patrick Nemeroff, Senior Director, Legal Counsel. We discuss how Cloudflare was sued by the patent troll Sable but emerged victorious. Sable was ordered to pay Cloudflare $225,000 and grant a royalty-free license to its entire patent portfolio.

Vanta's progress on its pledge to CISA's Secure by Design Initiative

Vanta’s mission is to secure the internet and protect consumer data. Following the launch of the U.S. Cybersecurity and Infrastructure Security Agency (CISA)’s Secure by Design pledge on May 8, 2024, Vanta continues to reinforce our commitment to our mission daily as one of the first organizations to adopt CISA’s Secure by Design pledge. ‍ This pledge simplifies the implementation of best security practices for software companies—raising the bar for protecting customer data.

The Rise of ZTNA: A Seamless Path to Remote Access

Working remotely using cloud applications is now the norm for getting things done. But while these shifts offer greater flexibility, they also bring new security challenges. For years, virtual private networks (VPNs) were the go-to solution for securing remote access. But when used at such a large scale, VPNs are inefficient, slowing users down and undoing the productivity gains that come along with remote work. Worse, they expose organizations to unnecessary security risks like lateral movement attacks.

How Do You Know if Your SSN Is Being Used?

To find out if someone else is using your Social Security number (SSN), you should check your credit reports, review your mySocialSecurity account and be cautious of calls from debt collectors. The idea of a stranger having such sensitive information about your identity can be terrifying. You may even be a victim of the recent data breach in which over 2.9 billion pieces of personal data were stolen from National Public Data.

What Can Someone Do With Your IP Address?

Once someone knows your IP address, they can determine your approximate location, track your online activity, impersonate you or conduct targeted DDoS attacks. Most cybercriminals will use your IP address to learn more personal information about you through phishing attacks, which can be used to identify and impersonate your internet provider.

NYSE Floor Talk with Judy Shaw ft. Torq CEO and Co-Founder, Ofer Smadari

NYSE Floor Talk with Judy Shaw ft. Torq CEO and Co-Founder, Ofer Smadari Ofer Smadari, Torq’s CEO and Co-Founder joined Floor Talk with Judy Khan Shaw to talk about Torq’s momentum from our $70M Series C and what sets Torq Hyperautomation apart from legacy technology.

API Security Essentials: What You Must Know About Positive and Negative Models #apisecurity #api

In this video, we dive into the fundamentals of API security by comparing two key security models: Positive and Negative. Learn how each model works, their pros and cons, and how to choose the right one to protect your APIs effectively.