Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Developer-centric DAST with Bright Security

Security testing is increasingly viewed as an essential part of the software development lifecycle (SDLC). Traditionally, agile software development has focused on development velocity, rapid market feedback, and delivering high quality products and services. However, software that's vulnerable to cyber attacks is not valuable to end users and creates huge risks for both customers and software vendors. This makes it critical to integrate security testing into the software development process.

New Service Offering to Manage and Run Velero Backups at Enterprise Scale

It’s spring again, and as the weather warms, the birds sing, and the flowers bloom, our thoughts here at Catalogic have turned to yet another major CloudCasa feature update! Our engineering team has (as they like to frequently point out) exceeded all reasonable expectations once again by delivering a veritable cornucopia of new features.

Glamourizing fraudsters hurts victims of fraud, and society

We seem to be fascinated by fraudsters, and recent documentaries prove this. The documentary landscape is populated with many fraud-centered stories, such as The Tinder Swindler, Fyre, The Con, Fake Heiress, The Inventor, and many others. Some have even been made into series, such as the story of Elisabeth Holmes in The Dropout, and the story of Anna Delvey in Inventing Anna. We just can’t get enough of it, and who can blame us? These stories are fascinating, entertaining, and engaging.

Microsoft warns accounting firms of targeted attacks as Tax Day approaches

Accountants are being warned to be on their guard from malicious hackers, as cybercriminals exploit the rush to prepare tax returns for clients before the deadline of US Tax Day. US Tax Day, which falls on Tuesday April 18 this year, is the day on which income tax returns for individuals are due to be submitted to the government. Inevitably it's a busy time for accounting firms and bookkeepers who are feverishly collecting necessary documents from their clients.

Send Your SOAR Events to Splunk

During a recent Proof of Concept (PoC) for Splunk SOAR with an existing customer of Splunk Enterprise Security (ES), I was asked if it was possible to send events/containers available in Splunk SOAR to Splunk ES as a Notable Event. While the reverse process of sending ES Notable Events to Splunk SOAR is highly documented, I was surprised to find hardly any documentation about the use case my customer brought up during the PoC. Hence, my cue to write my first ever Splunk blog!

Prepare for Zero-Day Threats in Your Supply Chain

Leading cybersecurity experts Major General John F. Wharton, (US Army ret); Oleg Strizhak, Shell’s Digital Supply Chain Risk Manager; and Sam Curry, the CISO of Zscaler, recently sat down with SecurityScorecard’s President of International Operations Matthew McKenna to discuss how organizations can prepare themselves and their supply chains for zero-day attacks as well as best practices for supply chain risk management.

Common OfferUp Scams to Watch Out For

One of the hottest online trends is auction sites selling everything from toys to cars and items tucked away in a closet. Sites such as Facebook Marketplace, Craigslist, and Decluttr, provide a way for anyone to sell anything. eBay and Craigslist began the craze of selling unwanted household items back in 1995. These sites sought to bring together buyers and sellers in an open and honest marketplace. Both companies expanded rapidly beyond collectibles into any saleable item.

Ultimate Security Checklist to Launch a Mobile App in Indonesia - iOS & Android

The Association of Southeast Asian Nations (ASEAN) region, including countries such as Singapore, Malaysia, Thailand, and Indonesia, is the fastest-growing digital market in the world. Mobile applications have become increasingly integrated into daily life in terms of financial transactions, eCommerce, healthcare avenues, and service deliveries. That being said, Southeast Asian countries are witnessing a high surge in cybersecurity attacks on mobile applications.

Top 8 Software Composition Analysis (SCA) Tools for 2023

The software development landscape moves quickly. As organizations seek to innovate at increasing speed, developers find ways to develop and deploy digital apps faster. More than 500 million cloud-native digital apps and services are being deployed this year–the same number of apps developed over the last 40 years! Against this backdrop, ensuring software code security and quality has become more critical–and challenging.

A Guide to Controlled Unclassified Information (CUI) Markings

Defense contractors and suppliers have anxiously been awaiting news on the roll-out date for CMMC 2.0. The DoD previously indicated it would publish a final or interim final rule in 2023 to formally implement the CMMC program and contractor compliance with its requirements. There is some indication that it will now be issued as a proposed rule in May of 2023.