Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Best practices for effective attack surface analysis

An application’s attack surface is the sum of points where it might be vulnerable to bad actors. It consists of all the paths in and out of the application. Identifying vulnerabilities is vital to mitigating threats because any access point is a potential entry point for an attack. An attack surface analysis, which is critical to this mitigation strategy, is the process of identifying and assessing the potential vulnerabilities and risks in a software system or network.

Swift deserialization security primer

Deserialization is the process of converting data from a serialized format, such as JSON or binary, back into its original form. Swift provides multiple protocols allowing users to convert objects and values to and from property lists, JSON, and other flat binary representations. Deserialization can also introduce unsuspecting security vulnerabilities in a user’s codebase that attackers could exploit.

Exposure Management: Best Practices for Getting Ahead of Cyber Risk

As your organization's attack surface expands—spanning across the cloud, remote locations, and interconnected digital supply chains—the potential for cyber risk exposure grows. Implementing a proactive cybersecurity exposure management program can enhance your understanding of your organization's cyber risk posture and facilitate informed decision-making about how to best allocate investments and resources.

ThreatQ Cyber Forum Recap: Expert Insights on Risk-Based Vulnerability Management

The discipline of vulnerability management has been around for decades and the way we assess risk, based on severity and likelihood of exploitation, has remained fairly constant. However, there are challenges in how this formula is usually applied that narrow our perspective on risk and our mitigation strategies.

Reviewing Remote Work Security: Best Practices

Remote work has shifted the mindset away from the old style of employment, showing up to the office every day. However, it seems that more businesses are starting to grab back some of the traditional practice of showing up to the office. The timing is probably helping, as the northern hemisphere is starting to warm up, making the commute to an office slightly more enjoyable. However, as we move towards an in-office presence, it may make us more relaxed about some of the rules of remote working.

A game of nations - How nation-states prepare for cyber threats with Locked Shields

This blog is the first post of a two-part series. Part 1 talks about the concept of a nation-state and then provides a high-level overview of Locked Shields — the world's largest cybersecurity exercise — and its increasingly important role in promoting cyber warfare readiness for NATO member states and partners. Part 1 also outlines the steps taken by nations to prepare for a cyber warfare exercise.

Tines Technical Advisory Board (TAB) Takeaways with Pete: part one

I’m Peter Wrenn, my friends call me Pete! I have the pleasure of being the moderator of the Tines Technical Advisory Board (TAB) which is held quarterly. In it, some of Tines’s power users engage in conversations around product innovations, industry trends, and ways we can push the Tines vision forward — automation for the whole team. Well, that’s the benefit to our customers and Tines.

6 Reasons Cyber Security Is Important for SEO

In today’s digital landscape, the importance of cyber security cannot be overstated. With the ever-increasing frequency of cyber threats, protecting sensitive data has become a priority for individuals and businesses. In search engine optimization (SEO), cyber security is also important. Google and users are more likely to trust websites that provide measures against common cyber security threats. Therefore, website owners with proper security systems can expect higher Google rankings.

New look, who dis? LimaCharlie's brand evolution.

Today we are launching an evolution of the LimaCharlie brand as part of our refreshed identity. The intention of this post is to simply let you know about the change, so you won’t be surprised when things coming from us look a little different. Similar to our introduction of the SecOps Cloud Platform, this evolution of our logo and brand is not driven by change for the sake of change.