Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

New archTIS Trusted Data Integration Solution for Structured Data

This week, during LandForces 2024 archTIS announced the launch of archTIS Trusted Data Integration, a new lightweight, fast, and agile solution for integrating, securing, and governing sensitive and classified structured data from multiple sources at scale and speed.

Tanium Podcast | Spot and prioritize threats faster with Tanium and Microsoft Copilot

“You don't need to be an expert in security response to effectively leverage powerful and complex tool.” Learn how Tanium customers get actionable responses in seconds to endpoint vulnerabilities and threats with Tanium & Microsoft Copilot for Security.

SOX Compliance in the Age of Cyber Threats

Achieving Sarbanes-Oxley (SOX) Act compliance is becoming more difficult. While the Act is primarily a financial reporting regulation, it requires all publicly traded companies operating in the United States to maintain the integrity, accuracy, and reliability of financial reporting, which those organizations can only achieve through robust cybersecurity measures. As such, an effective cybersecurity strategy is crucial for achieving SOX compliance.

Ransomware in the Global Healthcare Industry

The World Health Organisation (WHO) recently hosted a webinar to discuss the critical importance of cybersecurity in the healthcare sector, which highlighted the severity of the situation the industry is currently facing. Healthcare organisations are increasingly relying on digital systems to facilitate their daily workflow, but the prevalence of outdated legacy technology in the sector is rendering it vulnerable to cyberattacks with severe consequences.

Trustwave SpiderLabs Research: 20% of Ransomware Attacks in Financial Services Target Banking Institutions

The 2024 Trustwave Risk Radar Report: Financial Services Sector underscores the escalating threat landscape facing the industry. Deepfakes, highly realistic synthetic media, and the increasing adoption of cryptocurrencies are providing cybercriminals with new avenues to compromise financial institutions. These emerging threats are augmenting the already prevalent ransomware and phishing campaigns, creating a complex and dynamic threat environment.

How Does Spyware Get on Your Phone?

There are several ways spyware can get on your phone, such as someone installing it without your knowledge, downloading content from unreliable sources, clicking on malicious links or installing invasive apps. Spyware is a form of malware installed by a cybercriminal to spy on you and steal your personal information. Each type of spyware is designed to do something different, like watch you through your camera, display unwanted advertisements or record your keystrokes.

Do We Need Yet Another Vulnerability Scoring System? For SSVC, That's a YASS

The security world is awash in acronyms. As a niche in the security world, vulnerability, tracking, measurement, and management is no stranger to inscrutable collections of capital letters. We’ve got NVD, CPE, CWE, CVSS, EPSS, CAPEC, KEV, and of course “CVE”. The key goal of all these frameworks is to try to help folks organize information around vulnerabilities and assess how their presence might increase an organization's exposure.

Unparalleled Visibility and Threat Detection for SSE Environments

As organizations embrace digital transformation, security teams face growing challenges in maintaining visibility across diverse on-prem, cloud, and hybrid environments. With the rapid adoption of Secure Access Service Edge (SASE) and Security Service Edge (SSE) solutions, maintaining comprehensive visibility becomes even more critical.

The Veracode Customer Advantage: 184% ROI Realized

Are you getting the results you want from your application security (AppSec) program? Discovering the return on investment (ROI) is a great start, but how should you go about calculating that? That’s where our recently commissioned Total Economic Impact (TEI) study conducted by Forrester Consulting comes in. We’re thrilled and deeply grateful to share these customer stories with you.