Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CVE-2023-39336: SQL Injection Vulnerability in Ivanti Endpoint Manager

On January 4, 2024, Ivanti published a security advisory regarding a SQL injection vulnerability in their Endpoint Manager (EPM) solution, CVE-2023-39336. The vulnerability was rated with a CVSS of 9.6, as an attacker with access to the internal network can exploit this vulnerability to execute arbitrary SQL queries without authentication.

Behind the Ballot: Insights from Arctic Wolf's 2024 Election Security Survey

As the United States gears up for the 2024 election, the significance of cybersecurity for state and local governments cannot be overstated. In an era where digital threats are increasingly sophisticated, robust cybersecurity measures are essential to protect both the critical election infrastructure and the integrity of elections itself.

FedRAMP Authorization: A Value to Both Public and Private Organizations

The Federal Risk and Authorization Management Program (FedRAMP®) authorization has, for years, been seen as an arduous undertaking only for companies that want to do business with government agencies and their contractors. However, with growing cybersecurity risks, coupled with tightening data privacy regulations across industries, FedRAMP’s fundamental security requirements are becoming best practices for all organizations handling sensitive data.

8 Tips to Keep Your Digital Privacy Safe Against Online Threats

The Internet has become an integral part of everyday life. Every day, we exchange information, make purchases, and communicate with friends and colleagues via messages, email, and phone calls. However, we often do not think about how much information we provide about ourselves online when we make publications on social networks or simply search for a necessary video clip. According to Statista, as of April 2023, there were 5.18 billion Internet users worldwide.

How to choose a security tool for your AI-generated code

“Not another AI tool!” Yes, we hear you. Nevertheless, AI is here to stay and generative AI coding tools, in particular, are causing a headache for security leaders. We discussed why recently in our Why you need a security companion for AI-generated code post. Purchasing a new security tool to secure generative AI code is a weighty consideration. It needs to serve both the needs of your security team and those of your developers, and it needs to have a roadmap to avoid obsolescence.

4 SIEM Price Reduction Tactics Examined

A SIEM’s price can be a bit of a shock. As we’ve covered in another blog, the price of a security information and event management (SIEM) solution is never just about licensing (or whatever you initially agree to pay a vendor for data processing). Even though SIEM licensing costs can easily be tens of thousands of pounds for a small organisation with less than 20 GB of monthly data flow.

PCI DSS Requirement 1 - Changes from v3.2.1 to v4.0 Explained

As we all know, data security is a constantly evolving field, and it’s essential to keep up with the latest standards and requirements. And mark your calendars, because the current PCI DSS v3.2.1 is set to retire on March 31st, 2024. That’s right, the PCI Security Standards Council (SSC) has announced the release of the new and improved PCI DSS v4.0, and compliance with this updated version is mandatory for organizations to maintain data security.

Interview With James Rees, MD of Razorthorn Security

In SafetyDetectives‘ recent interview with James Rees, the Managing Director of Razorthorn Security, he provided insights into the company’s unique approach to cybersecurity consultancy and its evolution in response to the changing landscape. Established 17 years ago during a period of upheaval in the information security field, Razorthorn Security prioritizes customer satisfaction, fostering a customer-centric approach that has contributed to a high client retention rate.

Understanding Six Popular Azure Storage Types and Their Use Cases

The modern enterprise is all about the cloud. Digital transformation includes not only the adoption of cloud computing through application migration, but a transition from disk storage to cloud storage. Cloud storage has some key advantages over traditional disk storage, including the following: While there are multiple cloud storage options available today, including Amazon Web Services (AWS), Azure Storage is a logical choice for Microsoft Azure customers.