Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

As the Cyber Threat Environment Escalates, How are Organizations Responding?

Globally, the cyber threat level to organizations remains high and the current situation only serves to highlight this further. To this point, any organization that has substantial gaps in its cybersecurity capabilities is operating at risk, and when the threat landscape changes, as it has now, so we become more aware of the vulnerabilities that we have carried for some time and the need for better Cyber Threat Intelligence.

SBOM 101 - All the questions you were afraid to ask Software Bill of Materials

During many recent security incidents, we hear a lot of messages about the lack of knowledge of the code dependencies, attacks to the software supply chain, Software Bill of Materials (SBOM), digital signatures, provenance, attestation, etc. The fact is, every time a new vulnerability appears in the landscape, we usually need to spend a lot of time and effort to detect the real impact on the applications and services that are running in our environment.

Rediscovering argument injection when using VCS tools - git and mercurial

One of the main goals for this research was to explore how it is possible to execute arbitrary commands even when using a safe API that prevents command injection. The focus will be on Version Control System (VCS) tools like git and hg (mercurial), that, among some of their options, allow the execution of arbitrary commands (under some circumstances). The targets for this research are web applications and library projects (written in any programming language) that call these commands using a safe API.

Oracle SBC: Multiple Security Vulnerabilities Leading to Unauthorized Access and Denial of Service

Oracle Communications Session Border Controller (SBC) is one of the most popular products worldwide that helps service providers deliver trusted, carrier-grade, real-time communications such as VoLTE, VoIP, video conferencing and calling, presence, IM, and IPTV. Harold Zang, Senior Technical Security Specialist and Jeremy Nunn, Security Specialist at Trustwave SpiderLabs, identified three vulnerabilities in the Oracle SBC.

User Experience Matters: Ending the Tug of War Between Security and Performance

Security leaders often question why performance matters. In this blog, we will discuss the “tug of war” that exists between implementing robust security controls and delivering a superior user experience as we spotlight the findings from a new white paper from industry analyst IDC, and highlight why the design of the Netskope NewEdge infrastructure is so important to how we approach these challenges.

Why You Should Get Started with the Rego Policy Language

The Rego policy language is the backbone of Open Policy Agent (OPA), the policy enforcement tool that helps simplify cloud-native development at scale. With OPA Rego policy, the result is a reduced manual authorization burden, improved accuracy, and quicker time to market. But yes, there’s a learning curve, which makes Rego a main barrier to using OPA. You might be hesitant about the time investment needed to learn a new, highly specified language.

When prevention isn't better than cure

Learn to protect data from ransomware Explore real-life cybercrime examples Dive into the future of data security Learn to protect data from ransomware Register Now About half of CISOs say that their organisation is unprepared to cope with a coordinated attack. So they’re investing heavily to manage the risk. Deloitte reported that firms spend over 10% of their annual IT budget on cybersecurity. That works out at about $2-5 million per year for a typical enterprise.

MSSPs: Streamline your customers' operations with Tines

Today, MSSPs are trying to scale their businesses quickly, onboard customers with high-quality tool sets that evolve with the company, and maintain or increase margins. This means reducing costs, improving onboarding time, and building the next generation of MSSP (Managed Security Service Provider) or MDR (Managed Detection and Response) company. Threats in their own and customer environments continue to grow for MSSPs, as does the technology stack to support them.