Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Track SBOM Compliance with Coralogix

A Software Bill of Materials (SBOM) is essentially an inventory of the components used to build a software artifact, such as an application. While the concept of tracking an application’s components is not new, its importance has grown in recent years due to the rising threat of software supply chain attacks. One significant example is the SolarWinds attack, which highlighted how threat actors are increasingly targeting vulnerabilities in software components during the delivery process.

Introducing The Riscosity AI Governance Suite

Clients can empower their employees to securely leverage any browser-based AI tool. The Riscosity browser extension will scan and block prompts with sensitive information in real time. Admins can use the intuitive Riscosity dashboard to set RBAC rules and keep a pulse on any AI tools being used – including any attempts to share sensitive information. The bottom line… we’re providing an AI firewall for your company, without the headaches of difficult deployment.

Enhancing Enterprise Risk Management With Cyber Risk Quantification

‍Managing risk is a part of life, whether it's in the personal, private, public, or professional spheres, but often, these various areas of vulnerability are addressed in isolation. In the corporate world, too, the various components of business risk were once tackled as mutually exclusive, with each departmental leader focusing on their sole area of expertise.

Cybersecurity Awareness Month: AI Safety for Friends and Family

Happy October! The leaves are changing and everyone is starting to get ready for the upcoming holidays, but let’s not forget one of the most important holidays of the year—Cybersecurity Awareness Month! Though our audience is almost entirely cybersecurity experts, we wanted to put something together to help the less technical people in our lives learn more about AI and cybersecurity, because Cybersecurity Month is for everyone.

A Comprehensive Guide to Endpoint Backup and its Benefits

No matter what device you’re using, be it desktop, mobile, or tablet, all the data you store there is at risk of data loss. You could face data loss or cyberattacks such as ransomware unless you protect these files. Securing these devices with endpoint backup is essential for businesses and teams to protect against breaches, data loss, and other threats that can disrupt operations.

Foundations of trust: Securing the future of AI-generated code

Generative artificial intelligence (GenAI) has already become the defining technology of the 2020s, with users embracing it to do everything from designing travel itineraries to creating music. Today’s software developers are leveraging GenAI en masse to write code, reducing their workload and helping reclaim their valuable time. However, it’s important developers account for potential security risks that can be introduced through GenAI coding tools.

Simplifying Cybersecurity: Advanced Persistent Threat Detection with NDR Solutions

Advanced Persistent Threats or APT are a growing concern in the business world. Hackers are constantly improving their tactics and adopting new vulnerabilities. Organizations are scrambling with the increasing sophistication of attacks and are ready to invest in cybersecurity solutions in the hopes of early Advanced Persistent Threat detection and mitigation. However, before choosing a solution, it is important to understand the meaning and nature of APT.

Protecting Sensitive Data Sharing on Social Networking Sites

As organizations embrace social media for networking, marketing, and recruiting, platforms like Facebook, Instagram, LinkedIn, and X (formerly Twitter) have become integral to business operations. While social networking sites offer numerous benefits for productivity, collaboration, and engagement, they also introduce significant security challenges, particularly concerning the handling and potential exposure of sensitive data.

How Microsoft E5 Security Helps Protect Healthcare and Patient Data

In the healthcare industry, safeguarding patient data is not just a regulatory requirement but a moral imperative. With the increasing digitization of health records and the rise in cyber threats, healthcare organizations need robust security solutions. Microsoft E5 offers a comprehensive suite of security features designed to protect sensitive healthcare data. Coupled with Trustwave’s Microsoft expertise, organizations can get the most out of their E5 investments.

Interconnect Security Risks to Protect Your Kubernetes Environment

As Kubernetes and containerized environments become the backbone of modern application development, securing these environments grows increasingly complex. The distributed nature of microservices, the dynamic scaling of workloads and the ephemeral nature of containers introduce unique security challenges. Traditional approaches to risk assessment — where vulnerabilities, misconfigurations and threats are identified and prioritized in isolation — often fall short in such environments.