Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Beyond Passwords: Advanced API Authentication Strategies for Enhanced Security

Passwordless authentication for end users is taking the world by storm, offering organizations and individuals alike unprecedented security, user experience, and efficiency benefits. By all indications, the next generation of authentication for end users has finally arrived, sending the password the way of the dodo. Although they don’t get anywhere near the same hype, advanced authentication strategies for APIs are as critical as passwordless authentication for end-users.

How to Safely Integrate LLMs Into Enterprise Applications and Achieve ISO 42001 Compliance

Enterprise applications, whether on-premise or in the cloud, access LLMs via APIs hosted in public clouds. These applications might be used for content generation, summarization, data analysis, or a plethora of other tasks. Riscosity’s data flow posture management platform protects sensitive data that would otherwise be accessible to LLM integrations.

Ransomware Readiness: 10 Steps Every Organization Must Take

At the end of every year, the Trustwave content team asks its in-house experts what cybersecurity topics they predict will be top of mind in the coming 12 months, and inevitably the top answer is more ransomware. Instead of waiting an extra couple of months, we thought why not get ahead of the curve, pretend that ransomware will again be an issue, because it will, and proceed to the part of the story where we go through the problem and mitigation methods.

3 ways real companies complete security questionnaires faster

Security reviews are a critical step in the buying process where prospects assess your organization’s security posture and evaluate the risks associated with your business. The process typically occurs just before a deal is signed and sealed—when the stakes are especially high. ‍ Anyone who’s been involved in a security review before knows all too well how time-consuming, clunky, and manual the process can be.

DORA Compliance: Key Insights for Financial Institutions on New EU Regulations

As the January 2025 deadline approaches, financial institutions across the European Union prepare to increase their financial data security by meeting regulatory compliance standards with the Digital Operational Resilience Act (DORA). But what exactly is DORA, and why does it matter for your organisation? Let’s take a closer look.

Phishing Attacks Are Abusing Legitimate Services to Avoid Detection

Microsoft warns that threat actors are abusing legitimate file-hosting services to launch phishing attacks. These attacks are more likely to bypass security filters and appear more convincing to employees who frequently use these services. “Legitimate hosting services, such as SharePoint, OneDrive, and Dropbox, are widely used by organizations for storing, sharing, and collaborating on files,” Microsoft says.