Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The 2024 In-Depth Guide to OWASP Top 10 Vulnerabilities & How to Prevent Them

The OWASP Top 10 list is the go-to resource to begin understand application security risk for software developers and information security professionals. Most of us don't know we're harboring vulnerabilities in plain sight. During 2020 and 2021, there were an average of 15 vulnerabilities per site, and two out of these fifteen vulnerabilities were of high severity. ‍To protect against vulnerabilities, you first need to be aware of them. That’s where the OWASP Top 10 list comes in handy.

What is the Montana Consumer Data Privacy Act (MTCDPA)?

Montana Governor Greg Gianforte signed Senate Bill 384, the Montana Consumer Data Privacy Act (MTCDPA), on May 19, 2023. The consumer privacy law will become effective on October 1, 2024, and requires covered entities that process personal data to comply with several transparency and disclosure obligations. The MTCDPA follows the structure and scope of other US state data privacy laws, including the California Consumer Privacy Act, Tennessee Information Protection Act, and Colorado Privacy Act.

10 Popular SCA Tools to Protect Your Code in 2024

Software Composition Analysis (SCA) tools have been around since 2002, and they are now more critical than ever for identifying vulnerabilities in your codebase's libraries, frameworks, and third-party components. According to a Capterra report, 61% of businesses have been affected by a supply chain threat in the last year. If you’re one of the lucky 39%, Capterra suggests it really came down to luck - as nearly all companies use at least one third-party vendor.

How to Evaluate if Your Business Needs a VPN or RDP? What's the Difference?

The need for secure remote access solutions has increased in today's digital era. About two-thirds of businesses have had their data stolen because employees work from home. Four out of five companies have seen more email scams since people started working remotely. Almost 70% of businesses think they'll face more cyber problems because so many people work from home now.

How Does Bare Metal Storage Enhance Data Security Compared To Other Storage Solutions?

Bare metal storage enhances data security compared to other storage solutions by providing isolation and dedicated resources for each customer. Unlike shared storage solutions, bare metal storage ensures that data is not co-mingled with other customers, reducing the risk of unauthorized access or data breaches. Additionally, bare metal storage allows for greater control and customization of security measures, such as encryption and access controls, providing an added layer of protection.

Deep dive on PCI DSS 4.0 API Security Requirements

The Payment Card Industry Data Security Council created PCI DSS as the global standard for protecting payment data. The PCI DSS is the compliance stick to which entities that transmit, store, handle, or accept credit card data of any size must adhere. Recently, PCI DSS came up with version 4.0. In this blog, we delve deeper into the new version and explain why securing APIs is critical for PCI DSS compliance and how organizations can do so.

Malicious Insider Threats: How To Detect & Prevent Attacks

Data breaches and external threats are concerns for any security professional, but the most catastrophic security vulnerabilities often originate from malicious insider threats. This is not just an issue, it’s a pressing and immediate concern that demands our utmost attention. Here, we identify how to spot a malicious insider and provide proven strategies for preventing insider threats with technology-based solutions to protect your organization.

Netskope Security Service Edge: Once Again Highest in Execution, Furthest in Vision!

Today we are excited to announce that Netskope has once again been named a Leader in the Gartner® Magic Quadrant™ for Security Service Edge (SSE). This is the third time in a row Netskope has been recognized as a Leader—and we have been recognized as a Leader every time since the inaugural Magic Quadrant for SSE. We’ve also placed highest in vision and furthest in ability to execute for the second time in a row.

Unzipping the XZ Backdoor and Its Lessons for Open Source

By now, you have probably heard about the recently discovered backdoor into versions 5.6.0 and 5.6.1 of the tarballs of the xz utilities, a popular compression/decompression library for xz files, which provides unauthorized remote access under certain conditions. This vulnerability was reported under CVE-2024-3094. Andres Freund, of Microsoft, who discovered the vulnerability, summarized it well.