Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

US data transfers: are they allowed?

US data transfers... are they allowed? Well. Yes. It depends....it’s complicated. Let’s get stuck in and I’ll explain all. In July this year, the EU Commission made an adequacy decision for the new EU-US Data Privacy Framework (DPF). This can be seen as Safe Harbor 3.0. Essentially, in most scenarios, data transfers from the EU to the US are now permitted without the need for other mechanisms such as Standard Contractual Clauses (SCCs).

Identifying Assets for IT Risk Analysis

Any organization that uses information technology should conduct cybersecurity risk assessments from time to time. Each organization, however, faces its own unique set of security risks and needs to tailor its approach to addressing those specific risks within its risk management processes. To get started, you first need to identify all your organization’s IT assets, which might be subject to those risks.

20 Best Network Security Solutions + FAQs

The best security posture is a multi-layered security posture. Enterprise security leaders understand that no single tool or solution can provide best-in-class security to an entire organization on its own. As a result, security leaders continually invest in new security tools and platforms to address a growing list of emerging cyber threats like ransomware, credential-based attacks, and malicious insiders. However, not all network security solutions work together smoothly.

Mend.io Launches Mend Renovate Enterprise Edition

Mend Renovate is the industry leader in dependency management, downloaded more than a billion times — including by most of the top 10 tech giants — to help keep their applications safe and up to date. Its primary job is to scan your application software looking for external dependencies, and if newer versions are available, it will suggest code changes to upgrade you to the latest.

What's new in Riscosity: October

Custom Descriptions Teams can now design custom descriptions to provide context as to why a finding was ignored, resolved or marked as false positive. Previously, teams were provided a set of out of the box options, for the common use cases. The new flow resembles a standard documentation process where canned and contextual responses are available to help scale internal communication.

Effective Workflow For Your Audit Management Process

External and internal audits generate better insight into your data security, yet most employees flee from the process. Audits are cumbersome, time-consuming, and often feel peripheral to most people’s daily workload. Yet, several benefits of internal auditing make it a critical component of the long-term sustainability of your organization. However, mastering an efficient workflow for your audit management process, including risk-based internal audits, can make a significant difference.

GitProtect v. 1.6.0 Brings Granular Restore For Jira Software, GitHub Team & GitHub V2 Project Extended Support And More

Welcome to the extended reality of the GitProtect 1.6.0 release! What great features are awaiting you? We’ve been trying to hint about some upcoming changes in the Jira restore process to you earlier … And now we are more than happy to announce the official launch of the GitProtect Granular Restore for Jira Software.

Rise in MFA Bypass Leads to Account Compromise

In Q2 and Q3 of this year, Kroll observed an increase in large-scale AiTM phishing and BEC attacks targeting organizations within the professional services, banking and financial industries. In 90% of Kroll's recent BEC investigations, MFA was in place at the time of unauthorized access, but attackers can obtain authentication tokens and/or session cookies to easily evade defenses.

How to Resolve SSL Configuration Risks

Transport Layer Security (TLS) provides security for internet communications. TLS is the successor to the now-deprecated Secure Sockets Layer (SSL), but it is common for TLS and SSL to be used as synonyms for the current cryptographic protocols that encrypt digital communications through public key infrastructure (PKI).

Top 3 Vendor Cybersecurity IT Risk Assessment Templates

If you’re developing a vendor risk management (VRM) plan from scratch or looking to scale your existing program, a cybersecurity IT risk assessment template can help you get started. Fortunately, you have options. In this blog, we’ve listed several templates, frameworks, and checklists that can help you create a personalized vendor cybersecurity IT risk assessment questionnaire.