Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

MeriTalk Honors TGS President Bill Rucker with Prestigious 2023 Cyber Defenders Award

For the second year in a row, Trustwave Government Solutions President Bill Rucker was honored by Meritalk with its Cyber Defenders Award. Rucker earned this award, from the federal government IT news and events provider, for driving innovation, advancing the nation’s cybersecurity, and making significant contributions across cyber programs in Federal IT.

Introducing Passage by 1Password - the simple way to add passkey support to your app or website

Toward the end of last year, Passage joined 1Password to bring passwordless authentication to everyone. Now, we’re ready to introduce you to Passage by 1Password: the fastest and most secure way for developers and businesses to add passkey support to their products.

How to secure Generative AI applications

I remember when the first iPhone was announced in 2007. This was NOT an iPhone as we think of one today. It had warts. A lot of warts. It couldn’t do MMS for example. But I remember the possibility it brought to mind. No product before had seemed like anything more than a product. The iPhone, or more the potential that the iPhone hinted at, had an actual impact on me. It changed my thinking about what could be.

Announcing Cloudflare Secrets Store

We’re excited to announce Secrets Store - Cloudflare’s new secrets management offering! A secrets store does exactly what the name implies - it stores secrets. Secrets are variables that are used by developers that contain sensitive information - information that only authorized users and systems should have access to.

Large-Scale "Catphishing" that Targets Victims Looking for Love

For all the recent focus on artificial intelligence and its potential for deepfake impostures, the boiler room is still very much active in the criminal underworld. WIRED describes the ways in which people in many parts of the world (Ireland, France, Nigeria, and Mexico) have been recruited to work as freelancers for a company that seeks to profit from lonely people looking for love. This is how a typical operation runs.

Snyk top 10 code vulnerabilities report

Earlier this year, we released a report on the top 10 open source vulnerabilities from data based on user scans — giving you an inside look into the most common (and critical) vulnerabilities Snyk users found in their third-party code and dependencies. Building on this trend, we decided to look into the most common vulnerabilities in first-party code. While OWASP served as a guiding light for open source security intel, gathering data on proprietary code was a bit more complex.

25 Years Later: Reflecting on L0pht's 1998 Congress Testimonial and the Evolution of Cybersecurity

I look back on L0pht’s testimony before Congress in 1998 with a mix of pride and reflection. It’s been twenty-five years since our group of hackers (or vulnerability researchers, if you will) stepped up to raise awareness about the importance of internet security in front of some of the world’s most powerful lawmakers. This event marked the beginning of a long journey towards increased cybersecurity awareness and implementation of measures to protect our digital world.

More than 3 Million SchoolDude User Accounts Exposed in Data Breach

SchoolDude is a cloud-based work management tool for school districts and other organizations throughout the United States. This software service is used by school employees and students to submit repair requests and manage those same requests. The software is used to handle serious repairs in schools all over, and it also manages some confidential data about employees. This information was just released in a serious data breach that included more than 3 million user accounts.

SOC Metrics: Security Metrics & KPIs for Measuring SOC Success

The Security Operations Center (SOC) is the central unit that manages the overall security posture of any organization. Knowing how your SOC is performing is crucial, so security teams can measure the strength of their operations. This article describes SOC metrics, including their importance, common SOC metrics, and the steps SOC teams can take to improve them.