Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Finding problems that matter

See their previous blog for more! Towards the end of the 19th century, large cities like New York were facing a vexing problem so devastating that many questioned whether such cities could be sustained at all. People could no longer cross the street without assistance, stumbling was a common problem, disease was spreading, and even those issues had nothing on the horrendous stench emanating from every corner. We are talking, of course, about horse manure.

Dynamic Application Security Testing: DAST Basics

Application security testing (AST), which are tools that automate the testing, analyzing, and reporting of security vulnerabilities, is an indispensable part of software development. In a modern DevOps framework where security is shifted left, AST should be thought of as compulsory. And this has never been more important when you consider that Forrester reports the most common external attack method continues to be application weaknesses and software vulnerabilities.

Announcing Veracode Security Labs Community Edition

We recently partnered with Enterprise Strategy Group (ESG) to survey software development and security professionals about modern application development and how applications are tested for security. The soon-to-be-announced survey found that 53% of organizations provide security training for developers less than once a year, which is woefully inadequate for the rapid pace of change in software development.

Downtime Should Never Be Unplanned

After the onset of Covid-19, organizations pivoted quickly from a fixed, traditional kind of infrastructure to a virtual, distributed one to support remote workers and enable social distancing. The nature of stop-gap responses to this crisis opens your organization up to more risk, less resiliency and redundancy. How are you going to make sure your flexible architecture and dispersed teams can deal with penetrations, loss of connectivity and other outages? Now, more than ever, comprehensive governance across all of your infrastructure—in both IT and OT networks—is essential.

FBI Releases Flash Alert on Netwalker Ransomware

The Federal Bureau of Investigations (FBI) released a flash alert in which it warned organizations about the dangers of Netwalker ransomware. On July 28, the FBI revealed in Flash Alert MI-000130-MW that it had received notifications of attacks involving Netwalker against U.S. and foreign government organizations along with entities operating in the healthcare and education sectors.

Cybersecurity Baseline for IoT Device Manufacturers

The pervasive impact of Internet of Things (IoT) devices on our lives is greater than that of traditional IT devices. There are several unknowns in IoT security, and it raises concerns for customers who are looking to incorporate IoT devices in their existing infrastructure. Fortunately, security by design can resolve some of the major root causes of the underlying vulnerabilities in these connected devices.

Suspicious Activity Monitoring: Reducing the strain of false positives in real-time

The COVID-19 Pandemic has enabled contactless payment volumes to increase quicker than previously projected. According to Juniper research, contactless payments will triple to $6 trillion worldwide by 2024, up from about $2 trillion in 2020, as the amount of mobile wallet transactions increase and banks expand the use of contactless cards.