Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

4 MSSP Trends: Differentiate Your Business with CTEM, AI SOC, and More

MSSPs have huge potential for growth as more and more companies turn to experts to outsource their cybersecurity. Tailwinds such as escalating cyber threats, the need to protect more customer data than ever before, and growing compliance requirements are driving the managed security services market’s growth at a compound annual growth rate of 15.4% from 2023 to 2030.

Celebrating Five Years as a Customers' Choice in Application Security Testing

We are thrilled to announce that, thanks to your support and trust, Veracode has been recognized as a Customers' Choice in the 2024 Gartner Peer Insights Voice of the Customer for Application Security Testing for the fifth consecutive year! We believe this distinction is not just a testament to our solutions and services but, more importantly, a reflection of the strong partnerships we have formed with each of you.

Seeing the Unseen: Salt Security and eBPF

APIs are crucial in our digital world, but they also introduce new vulnerabilities. Attackers often exploit these vulnerabilities by concealing malicious payloads within encrypted traffic, rendering them undetectable to traditional security tools. As we observe Cybersecurity Awareness Month, it's important to emphasize the significance of advanced solutions that can detect hidden threats.

API Gateways and API Protection: What's the Difference?

Modern businesses are increasingly reliant on APIs. They are the building blocks facilitating data exchange and communication between disparate systems. Because of their prevalence and importance, they are also under attack by actors exploiting vulnerabilities and misconfigurations. Unauthorized access, data exposure, injection attacks, broken authentication, DoS attacks, shadow or unmanaged APIs, insecure API dependencies, and more present a real risk to APIs and the organizations that use them.

SaaS Security: Understanding Modern Threats and How to Guard Against Them

The rise of cloud-based software applications has changed the way many companies operate. Leveraging SaaS platforms allows organizations to streamline their workflows and better accommodate remote and hybrid workforces. However, spreading your data throughout the cloud can leave it vulnerable — unless you have strong SaaS security practices in place.

SecurePortal 2.9 - Introducing Live Reporting

We are thrilled to introduce two exciting new features to SecurePortal: Live Vulnerabilities and Chat. With Live Vulnerabilities, you can now access real-time vulnerability information as consultants identify them, significantly reducing the risk window. This enhancement enables your IT teams to begin triaging vulnerabilities within minutes, rather than waiting for the full assessment to be published. You can mark vulnerabilities as resolved as soon as they are fixed, even during an ongoing engagement.

The 2024 Elastic Global Threat Report: Visibility enhanced

Elastic Security Labs discovers that threat actors are taking advantage of readily available abused security tools and misconfigured environments. Elastic Security Labs has released the 2024 Elastic Global Threat Report, surfacing the most pressing threats, trends, and recommendations to help keep organizations safe for the upcoming year. Threat actors are finding success from the use of offensive security tools (OSTs), a misconfiguration of cloud environments, and a growing emphasis on Credential Access.

CMMC 2.0: A Roadmap to Compliance with Trustwave

The U.S. Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) 2.0 has passed through the Office of Information and Regulatory Affairs and is now on its way to Congress, set to become law by Q4 2024. With the CMMC becoming official law, its full implementation in defense contracts will occur through a phased approach over three years starting in 2025.

ZTNA Use Cases: Real-World Examples for Modern Enterprises

The rise of hybrid and remote work has created unprecedented opportunities for forward-thinking organizations and their employees. At the same time, it has also created unprecedented opportunities for threat actors. The ability to access sensitive files from almost any machine, while convenient, can be a profound security risk. That’s why it’s worth considering a few real-world ZTNA use cases.