Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

So, You Want to be Compliant. Now What?

Cybersecurity compliance frameworks serve two functions: (1) they voluntarily provide a roadmap for organizations to follow to create robust, sustainable cybersecurity programs and (2) they mandatorily serve as legal or regulatory obligations to which organizations must demonstrate adherence. The ultimate intent of cybersecurity frameworks, regardless of their underlying function, is to reduce cybersecurity risk.

Traditional Email Security is Failing; Business Leaders Must Evolve

Egress Software is a cybersecurity firm specializing in digital communications. They analyze security risks within emails, messaging, documents, file-sharing gateways, and more. In their line of work, humans are the most significant cybersecurity risk to any organization.

Trustwave Government Solutions Achieves "FedRAMP In Process - PMO Review" Designation

Trustwave Government Solutions (TGS) is proud to announce its designation as “In Process Program Management Office (PMO) Review" by the Federal Risk and Authorization Management Program (FedRAMP) for its Government Fusion platform. TGS expects to receive full authorization in early 2024.

How Egnyte Metadata Supports DLP Integration

Using AI-based content detection, Egnyte has demonstrated the ability to detect and classify millions of documents for our customers over several years. Egnyte customers can locate files containing sensitive information, write safeguard policies to control how they are shared, and write file lifecycle management policies to automate retention, archival, and deletion.

What Is a Botnet?

A botnet is a network of infected devices known as bots, which are controlled by a single attacking party known as a bot herder. Botnets are made up of Internet of Things (IoT) devices such as computers, mobile devices, network routers and smart TVs. Botnets are used to carry out time-consuming cyber activities such as managing online chatrooms or tracking internal data. However, cybercriminals can use botnets for malicious purposes such as launching large-scale cyber attacks and stealing sensitive data.

Announcing a Unified Veracode SAST and SCA IDE Plugin

Veracode is pleased to announce the availability of a new Integrated Development Environment (IDE) Plugin for VS Code. Our new plugin combines both Veracode Static Analysis (SAST) and Software Composition Analysis (SCA) into a single plugin. This allows developers to quickly scan projects for security weaknesses and risks in both first-party code and third-party libraries.

eIDAS 2.0: Your Comprehensive Guide to Protect Digital Identity

Digital identity is becoming important these days. Whether for online banking, online shopping, or dealing with government officials, digital identity helps you to perform transactions securely online. On the other hand, conventional authentication methods are reaching their limit regarding maintaining security. However, technological advancements have paved the way for advanced approaches to user identification. This advancement adds to the advanced rules, laws, and regulations in the European Union.

The Top Financial Organization Cyber Risks of 2024

For years, the BFSI industry has been a top target for cyberattackers. Yet, despite long-standing awareness of financial cyber risks, the problem is only getting worse as banks, insurance companies, FinTech businesses and other organizations that operate in the finance sector face a growing array of threats and risks. For example, threat actors are increasingly using financial organizations’ customers as a vector for attack.

Apache ActiveMQ Vulnerability Leads to Stealthy Godzilla Webshell

Trustwave has observed a surge in attacks exploiting vulnerabilities in Apache ActiveMQ hosts. In certain cases, these host malicious Java Server Pages (JSP) web shells. The web shells are concealed within an unknown binary format and are designed to evade security and signature-based scanners. Notably, despite the binary's unknown file format, ActiveMQ's JSP engine continues to compile and execute the web shell.

How To Automate Recorded Future With Torq

One of the superpowers of the Torq Hyperautomation platform is the ability to integrate with anything. We team up with leading security vendors to combine forces to create automations that make SOC analysts’ lives easier while also improving their organizations’ security posture. In our latest blog series, Hyperautomation Cheat Codes, we look at some of Torq’s key partners and highlight some of the automations that we pair up on.