Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 5 - Identity Debt: The Hidden Risk in SaaS Applications

In this episode of the Security Matters podcast, host David Puner sits down with Lior Yaari, CEO and co-founder of Grip Security, for a discussion that covers the concept of identity debt and its implications for modern cybersecurity. Lior shares insights from his experience in Israel’s elite Unit 8200 and explains why identity is now the new security perimeter.

The Cost of Ransomware: Shutdowns & Extortion

Ransomware is no longer in its heyday. Evolving, AI-driven cybersecurity tools and global law enforcement efforts have seen to that. But that doesn’t mean ransomware is no longer a threat. In fact, in some ways, the danger is greater than ever. While ransomware attacks are less common than they used to be, the consequences of those that succeed are more severe. Earlier this year, the Ponemon Institute published a study revealing massive changes in the ransomware landscape.

How Research Supports the 2025 Bitsight Rating Algorithm Update

In keeping with Bitsight's ongoing commitment to making its ratings more meaningful and more representative of an ever-changing Cybersecurity landscape, the Ratings Algorithm Update for 2025 is scheduled to go into preview on April 8, 2025. The highlight of RAU 2025 is the incorporation of the Web Application Security(WAS) risk vector into the Bitsight Security Ratings1, and the associated deprecation/removal of Web Application Headers(WAH) risk vector.

Resurgent North Korean Malware Campaign in npm

Hello from the Veracode Research blog! It’s been a minute since we’ve done a malware write-up, but we’re back and ready for action! And speaking of folks who are back and ready for action, the North Korean attackers behind the crypto wallet stealer campaign we wrote about in February of 2024 and again in May of 2024 are back at it with a new batch of malicious npm packages.

Best Practices for Jira Sandbox to Production Migration

Jira sandboxes provide strategic leverage for the development lifecycle. Unfortunately for IT teams, migrating them to production environments is rarely straightforward. That means backups should be immediately pointed out as a vital part of the process. A smooth migration means tested changes in the sandbox are moved to the live system without errors. This makes the platform stable and minimizes potential problems.

Say Goodbye to SaaS Security Gaps with Cato CASB

As organizations increasingly depend on SaaS applications, IT teams struggle with visibility and governance. Shadow IT, unmanaged devices, and limited monitoring capabilities create blind spots, exposing enterprises to compliance violations, data exfiltration, and insider threats. Risks don’t come only from unsanctioned applications: even widely used SaaS platforms can become a security liability when not properly controlled.

Structured Data vs. Unstructured Data: Key Differences Explained

The amount of data worldwide is growing rapidly. According to the experts, in 2024, there was a significant 791.94% increase in data generation. There are mainly two types of data: structured and unstructured data. Both are used, maintained, and analyzed differently. But what is the basis of differentiation, and how can one find out which one is the best. In this blog, you will find out the pros and cons and use cases. So let’s begin!!