Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Cloud is Just Someone Else's Computer and They're Doing Things with it that You Need to Know

In this webinar, Netskope Chief Platform Officer, Joe DePalo, wades through the marketing hype, false claims and outdated approaches that cripple many clouds. Designed specifically for networking, infrastructure and operations leaders, Joe shares the most critical questions to ask your cloud providers. This webinar is particularly timely considering the shift to SASE and the convergence of security and networking.

How Security Ratings Can Harmonize Cybersecurity Regulations

In July of this year, the Office of the National Cyber Director (ONCD) stated in its release of an RFI on regulatory harmonization that: “When cybersecurity regulations of the same underlying technology are inconsistent or contradictory—or where they are duplicative but enforced differently by different regulators … consumers pay more, and our national security suffers.” This is an understatement. SecurityScorecard agrees and was happy to share our comments with ONCD today.

Cyber Trust and Transparency

In cybersecurity, the terms “trust” and “transparency” are often mentioned. And while they should no doubt be a priority, they can also be difficult to quantify. Good CISOs recognize that transparency in cybersecurity isn’t a one-time effort. It’s a continuous process that involves a near-constant state of evolution. But with the right tools and systems in place, it’s possible to not only measure trust and transparency but improve them as well.

20 Best Network Security Solutions + FAQs

The best security posture is a multi-layered security posture. Enterprise security leaders understand that no single tool or solution can provide best-in-class security to an entire organization on its own. As a result, security leaders continually invest in new security tools and platforms to address a growing list of emerging cyber threats like ransomware, credential-based attacks, and malicious insiders. However, not all network security solutions work together smoothly.

Mend.io Launches Mend Renovate Enterprise Edition

Mend Renovate is the industry leader in dependency management, downloaded more than a billion times — including by most of the top 10 tech giants — to help keep their applications safe and up to date. Its primary job is to scan your application software looking for external dependencies, and if newer versions are available, it will suggest code changes to upgrade you to the latest.

What's new in Riscosity: October

Custom Descriptions Teams can now design custom descriptions to provide context as to why a finding was ignored, resolved or marked as false positive. Previously, teams were provided a set of out of the box options, for the common use cases. The new flow resembles a standard documentation process where canned and contextual responses are available to help scale internal communication.

GitProtect v. 1.6.0 Brings Granular Restore For Jira Software, GitHub Team & GitHub V2 Project Extended Support And More

Welcome to the extended reality of the GitProtect 1.6.0 release! What great features are awaiting you? We’ve been trying to hint about some upcoming changes in the Jira restore process to you earlier … And now we are more than happy to announce the official launch of the GitProtect Granular Restore for Jira Software.

Apono - Okta Integration: Requesting temporary access to Okta groups

ICYMI: In the last video demo of @Okta + Apono, we showed you how to integrate your Okta resources with Apono through SCIM. (It’s super simple!) Once the integration is done, Okta users or group members can easily request temporary access to different cloud resources using our just-in-time capability. That includes temporary access to Okta group membership If you're managing your developer-on-duty, customer data access, or any other use case with Okta groups, you don’t want to miss out on this one.

7 Types of Social Engineering Attacks

When a ransomware group launched twin cyber attacks on casino giants MGM and Caesars, they only needed the accidental participation of the organizations’ outsourced IT help desk to get started. It was social engineering — in this case impersonation over the phone, or vishing— that gave the hackers the information they needed to launch a ransomware attack that cost both casinos millions.

Rise in MFA Bypass Leads to Account Compromise

In Q2 and Q3 of this year, Kroll observed an increase in large-scale AiTM phishing and BEC attacks targeting organizations within the professional services, banking and financial industries. In 90% of Kroll's recent BEC investigations, MFA was in place at the time of unauthorized access, but attackers can obtain authentication tokens and/or session cookies to easily evade defenses.