Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

[Mastering Minds] China's Cognitive Warfare Ambitions Are Social Engineering At Scale

As the world continues to evolve, so does the nature of warfare. China's People's Liberation Army (PLA) is increasingly focused on "Cognitive Warfare," a term referring to artificial intelligence (AI)-enabled military systems and operational concepts. The PLA's exploration into this new domain of warfare could potentially change the dynamics of global conflict.

Are Your Company Secrets Safe on GitHub? Here's Why You Need to Request a Complimentary Audit

With a large number of developers, it’s highly likely that your company’s secrets are publicly exposed without your knowledge. Request your audit today and take control of your GitHub security perimeter.

Thousands of Students and Faculty Exposed in Bristol Community College Data Breach

Bristol Community College is a mid-sized public university located in Fall River, Massachusetts. The school employs more than 1,000 individuals and has over 11,000 students annually. The school houses an extensive amount of data for its employees and its students, and some of that data was put at risk by a recent breach. The data breach left many people involved with the school at risk of being exposed and suffering from identity theft attacks.

Weekly Cybersecurity Recap May 26

Health, financial, and education institutions took major hits this week in coordinated data breach attacks. PharMerica Credit Control Corporation, Retirement Clearinghouse, Whitworth University, and Bristol Community College were all victims of major breaches that resulted in significant data losses and some serious problems for the people involved. Massive companies are being hit by these breaches, and you should consider credit monitoring services for your own personal safety.

What are FedRAMP Requirements? (And Who Needs to Know)

For SaaS applications and cloud service providers (CSPs), maintaining compliance with FedRAMP requirements is critical to the bottom line. It means the difference between working with U.S. government agencies—or not. But as one might expect from a bureaucratic process, getting FedRAMP authorization is complicated and takes time. Before starting the FedRAMP approval process, teams and company leaders must understand the required steps, prepare thoroughly, and muster their patience.

Mend.io + Jira Security: Doing DevSecOps Better Together

We hear a lot about the urgency of transition from DevOps to DevSecOps, and with good reason. The ongoing rise in cyberattacks across the software supply chain, coupled with a shifting regulatory landscape, highlights the growing urgency of improving application security. But it’s one thing to recognize the importance of integrating security into the software development process, and another thing to actually succeed at doing so.

What are the Best Data Room Services on the Market Today?

The billion-dollar virtual data room industry is growing by leaps and bounds. What's more, according to projections, the data room software industry will hit the $3 billion figure. The market is divided into different regions, including North America, Europe, Asia Pacific, and the rest of the world. North America leads as the biggest consumer of virtual data rooms.
Featured Post

GDPR - the benchmark for a global privacy framework

With the 5th anniversary of GDPR looming, this regulation continues to be a game-changer, setting the precedent for privacy and data laws around the world. In fact, the United Nations Conference on Trade and Development (UNCTAD) recently reported that 71% of countries now have data protection regulations in place and a further 9% have legislation in development. Countries such as Vietnam and Saudi Arabia have recently introduced new privacy laws. But, as we reflect on the anniversary of GDPR's introduction, just this week we've seen the first billion-dollar fine issued. So, what does this mean for data privacy moving forward?

DevSecOps and log analysis: improving application security

More and more organizations are abandoning the outdated waterfall development methodology for more practical and efficient Agile development practices. As this movement has occurred, development teams are moving faster than ever by employing Continuous Integration (CI) and Continuous Deployment (CD) practices that are serving to shorten development cycles and get new features into production faster. This does, however, come with greater security risk in some respects.

[SEG Headache] More Than Half of Cybersecurity Leaders Say That Too Many Phishing Attacks Get Through

Egress, a cybersecurity company that provides intelligent email security, recently released their Email Security Risk Report 2023. It's solid research that shows 99% of cybersecurity leaders are stressed about their email security with good reason. The numbers are scary. We mentioned their report a few weeks ago, but there are many important findings there.