Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Lost in Translation: Vulnerability Management Communication Gaps

Vulnerability management is absolutely critical to protecting an organization’s IT and cloud infrastructure, systems, or applications from incoming threats. The ability to remediate the most relevant vulnerabilities quickly is the only way to keep your perimeter safe. Yet, security teams struggle with managing vulnerabilities. Why? At the core lies a fundamental communication and collaboration problem.

Phishing is Still the Top Initial Access Vector

Phishing remains a top initial access vector for threat actors, according to researchers at ReliaQuest. Phishing and other social engineering tactics can bypass security technologies by targeting humans directly. “The enduring dominance of phishing as an initial access technique underscores its effectiveness and persistence in the face of cybersecurity advancements and more sophisticated methodologies,” the researchers write.

Cyber security measures for small and medium enterprises (SMEs)

The risk of cyber attacks for companies is increasing and can significantly disrupt their operations, have negative financial consequences and damage their reputation. Small and medium enterprises (SMEs) are especially vulnerable to these attacks due to limited resources and a lack of cyber security expertise. Understanding the significance of cyber security is crucial for protecting sensitive data and ensuring business continuity.

A CISO's Checklist For Securing APIs And Applications

Building a robust API and application security program is a key objective for security leaders in any market. But developing and maintaining an effective security program for your APIs and web applications requires: ‍- A deep understanding of the right approach to implementing API and application security.

A CISO's View on the State of API Security: Discussing the API ThreatStats Report, Q2 2024

API exploits represent one of the fastest growing threat vectors–a trend that will continue to accelerate as the increasingly AI-driven digital economy grows. Join veteran CISO and application security expert Mike Wilkes and Wallarm’s VP of Product, Tim Erlin, as they discuss the state of API security and where it is heading. Drawing upon their extensive industry experience as well as insights drawn from the Wallarm API ThreatStats Report Q2, 2024.

Introducing GitGuardian Software Composition Analysis (SCA)

Introducing GitGuardian Software Composition Analysis, further expanding the capabilities of our code security platform. You have long known GitGuardian for secrets detection and remediation, honeytokens, and IaC scanning. Now, with GitGuardian SCA, you can effortlessly scan your applications to detect known vulnerabilities introduced through both Direct & Transitive dependencies. The platform will automatically prioritize incidents depending on their context and help developers find the best path to remediating any issues.

Understanding Incident Reporting Under the NIS2 Directive: Key Insights for Managed Service Providers and Managed Security Service Providers

Incident reporting is a crucial component of maintaining cybersecurity and operational resilience across the European Union. As outlined in Article 23 of the NIS2 Directive entities falling under its scope are required to report “significant incidents” to the CSIRT (Computer Security Incident Response Team or the relevant competent authority without undue delay.

What Is User Management?

Effective user management allows people to access resources while protecting the security and integrity of data and IT infrastructure. With the rise of remote work and cloud-based applications and infrastructure, user management is a foundational security measure. User management also streamlines the process of creating, controlling, and deleting user accounts, lightening the administrative burden on your IT team.