Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Your ultimate guide to security frameworks

Trust is a vital part of any growing business. A part of earning and keeping the trust of your customers is implementing the right security measures to protect their data and your systems from any breaches that could impact them. ‍ By aligning with industry-vetted security frameworks, you’ll be able to build a strong security posture that protects your systems and earns customer trust. There are many security frameworks that could be applied to your infrastructure.

What a Vulnerability in Salesforce Apex Code Means for You

Varonis researchers have recently disclosed that several government agencies and private-sector companies had customized or added features to their Salesforce Apex code that leaked data, allowed data corruption, or allowed an attacker to disrupt business functions. Impacted data included the usual suspects like phone numbers, addresses, social security numbers, and username/password combinations.

Passwordless Authentication vs MFA: What's the Difference?

The main difference between passwordless authentication and Multi-Factor Authentication (MFA) is that passwordless authentication completely removes the use of passwords, whereas MFA is used in conjunction with passwords. There are also differences in a user’s login experience when using passwordless authentication versus MFA, deploying each of them and their cost. Continue reading to learn more about the differences between passwordless authentication and MFA.

CVE-2024-21410, CVE-2024-21413, and CVE-2024-21401 Lead the list of Critical & Actively Exploited Vulnerabilities in Microsoft's February 2024 Patch Tuesday

On February 13, 2024, Microsoft published their February 2024 security update with patches for 73 vulnerabilities. Among these vulnerabilities, Arctic Wolf has highlighted 5 vulnerabilities in this bulletin that were categorized as critical or zero-day vulnerabilities. Two of these vulnerabilities have been reported to be exploited in the wild.

Critical Vulnerabilities in ConnectWise ScreenConnect Patched

On February 19, 2024, ConnectWise published a security bulletin detailing two critical vulnerabilities within their on-premises ScreenConnect software. At the time of writing, these vulnerabilities do not have CVE numbers assigned to them. ConnectWise has stated that the vulnerabilities have the potential to result in remote code execution (RCE). Vulnerability #1 (CVSS: 10): Allows a threat actor to achieve authentication bypass by leveraging an alternate path/channel.

The Future of Security Operations: An Inside Look at the LimaCharlie SecOps Cloud Platform

So, you’ve heard of LimaCharlie, but want to know more? Do you want to better understand how you can best utilize the SecOps Cloud Platform for your environment? Join Matt Bromiley, Lead Solutions Engineer, as he breaks down the SCP and provides an in-depth look at how LimaCharlie is redefining security operations.

DataTrails US DOD Explainable AI Trust Demo

DataTrails revolutionizes data integrity and transparency by enabling control over data flows, validating data sources, and constructing mutually accountable records. This approach not only meets the immediate need for secure and trusted data exchange but also lays the groundwork for AI systems to automate sensitive workflows confidently. DataTrails' patented distributed ledger technology underpins AI-driven decision-making, ensuring resilience, explainability, and regulatory compliance.