Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

SecurityScorecard Achieves FedRAMP 'Ready' Designation

SecurityScorecard is proud to announce that it has achieved the Ready Designation under the Federal Risk and Authorization Management Program (FedRAMP). This designation demonstrates SecurityScorecard’s commitment to the rigorous security standards required by the U.S. government for cloud service providers, and it will enable the company to meet growing demand from U.S. federal agencies for its Third-Party Cyber Risk Management Platform. U.S.

Add to Your AppSec Arsenal with Mend.io's Integration with Secure Code Warrior

We’re delighted to announce that Mend.io has launched a new integration with Secure Code Warrior®, a platform that provides secure coding training and tools that help shift developer focus from vulnerability reaction to prevention.

Firewall Traffic Analysis: The Complete Guide

Firewall traffic analysis (FTA) is a network security operation that grants visibility into the data packets that travel through your network’s firewalls. Cybersecurity professionals conduct firewall traffic analysis as part of wider network traffic analysis (NTA) workflows. The traffic monitoring data they gain provides deep visibility into how attacks can penetrate your network and what kind of damage threat actors can do once they succeed.

10 Best Firewall Monitoring Software for Network Security

Firewall monitoring is an important part of maintaining strict network security. Every firewall device has an important role to play protecting the network, and unexpected flaws or downtime can put the entire network at risk. Firewall monitoring solutions provide much-needed visibility into the status and behavior of your network firewall setup. They make the security of your IT infrastructure observable, enabling you to efficiently deploy resources towards managing and securing traffic flows.

How StoryChief's CTO uses Aikido Security to sleep better at night

Losing sleep imagining bad actors infiltrating your awesome new startup’s code? Not anymore! Aikido Security has designed startup security to be affordable, efficient, and fill the needs of CTOs. Let’s have a look at how Aikido transformed StoryChief’s security posture.

Navigating the cyber battleground: The vital role of network security policy management

The landscape of cyberthreats is continuously evolving, and to keep pace organizations employ robust network security strategies. This involves creating, executing, and maintaining a set of guidelines, or network security policies, on how the organization’s network should be protected from external threats. This process is termed network security policy management (NSPM) and it’s instrumental in maintaining the integrity of the network.

What You Need to Know About the October OKTA Breach

Okta, a provider of identity and authentication management services, reported that threat actors were able to access private customer data by obtaining credentials to its customer support management system. According to Okta’s Chief Security Officer, David Bradbury, the threat actor had the capability to view files uploaded by specific Okta customers in recent support cases.

Cybersecurity Power Plays: Product Pairings for Stronger Security

In sports, the most successful teams master the art of strategic combinations. The same is true within the cybersecurity arena. In today’s expanding and complex threat landscape, trying to beat cyber opponents with a starting lineup of disparate point solutions is a losing strategy. How much better would your cyber defenses be with correlated threat intelligence across each of your key security solutions?

A Brief History of Phishing, and Other Forms of Social Engineering

Social engineering attacks have a very long history, though the Internet has made it easier to launch these attacks en masse, according to Sean McNee at DomainTools. McNee points to an advance-fee scam from 1924, in which a crook sent a letter pretending to be trapped in a Spanish debtors prison. The sender requested that the recipient send a check for $36,000 to pay off his debt. After the sender is freed, he promises to pay the recipient back, with an extra $12,000 for the trouble.