Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The ultimate security questionnaire guide for vendors: Simplify compliance & build trust

In this article If you’re like 98% of organizations, you have at least one vendor that’s had a breach in the last two years. Although this doesn’t necessarily mean affiliated organizations were affected by the breaches, it does emphasize the extensive range and proximity of potential exposure to indirect risks. Vendors must develop a deep understanding of security questionnaires and implement best practices.

Inside the Weebly Phishing Campaign: A Sophisticated Threat to Financial Institutions

A recent investigation by BlueVoyant’s threat analysts has uncovered a sophisticated phishing campaign exploiting the Weebly.com platform to create fraudulent websites targeting small to mid-sized banks and financial institutions across the United States. This campaign stands out for its widespread scale and diffusion. Over the past few months, BlueVoyant has identified hundreds of phishing websites targeting more than 200 American banks and financial institutions.

EP 13 - Pizza parties and profit margins: The business of cybercrime

Cybercriminals today operate more like startups than stereotypes—complete with org charts, sprint cycles, and pizza parties to celebrate successful breaches. In this episode of Security Matters, host David Puner talks with former CISO and U.S. Air Force veteran Ian Schneller about the evolving sophistication of threat actors and what it takes to stay ahead.

What the Tea App Breach Reveals About Mobile Security in 2025

In July 2025, Tea Dating Advice—an app designed to help women vet dating partners—was thrust into the spotlight after a catastrophic data breach. International publications, including BBC, NPR, and The New York Times, reported that over 72,000 user images and 1.1 million private messages were leaked, exposing deeply sensitive information about more than 1.6 million users. The breach affected users who joined before February 2024 due to a failure to migrate legacy data to secure storage.

Defending Digital Trust: Fighting Brand Impersonation in the Wild

Just do it. Think different. The happiest place on earth. Nike, Apple, Disney are three iconic brands that have forever cemented themselves in our consciousness. How did they get there? A catchy slogan? A flashy logo? Sure, while slogans and logos change over time, they still make an impact. But what truly secures a brand’s reputation is trust. And trust is built over years, even decades, through consistency, authenticity, and relentless effort.

How have you seen successful organizations integrate HIPAA compliance into their everyday operations rather than treating it as just an annual audit requirement?

In this article Organizations that treat HIPAA compliance as a living, breathing part of their operations, not just an annual checkbox, are the ones best positioned to protect patient data, mitigate risk, and build enduring trust with patients and partners.

Mastering C/C++ Security: How to Simplify Static Application Security Testing and Boost Accuracy

C/C++ development is notorious for its challenges: complex builds, limited tool compatibility, and frustratingly long scan times. But what if you could cut through the noise, streamline your security testing, and achieve unparalleled accuracy? Imagine a solution that not only simplifies your workflow but also delivers precise, actionable results without the false positives that slow you down. With Veracode’s C/C++ Scanning, you can.

Why Saudi Arabian Banks Demand Tighter Payment Security?

If you’ve been running a business in Saudi Arabia that accepts card payments, you’ve probably noticed banks getting more strict about payment security. It’s not just a random policy change, there’s a bigger story here, and understanding it could save your business from serious trouble.

Seemplicity x SANS: The Future of Vulnerability Management is RemOps

Despite ongoing investment in detection tools, vulnerability management continues to underdeliver. Security teams don’t lack data. They lack the systems to act on it. According to our latest research, 91% of organizations report delays in remediation, and 41% say they struggle to make findings actionable. The result is a persistent backlog of exploitable vulnerabilities, compounded by manual workflows and poor coordination between teams.