Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

As the Holiday Season Begins, 73% of Retail and Hospitality Apps Have a Flaw

After the pandemic upended the retail and hospitality industries, digital transformation became imperative to survival – the key to meeting ever-changing customer expectations and overcoming supply chain complexities. As the landscape continues to shift, 55 percent of retailers say they’re open to improving their innovation capabilities, while 51 percent want to adopt new business models.

What's InfoSec? Information Security Explained

A major subset of overall cybersecurity, Information Security focuses on protecting sensitive data and information from the risks of cyberattacks. It covers but is not limited to: The fundamental goal of information security is to prevent sensitive data from being compromised by criminals or state actors. InfoSec encompasses a wide range of tasks and practices, spanning from monitoring user behavior to assessing risk to ongoing education.

Explore the Splunk SOAR Adoption Maturity Model

This past June I presented a.conf22 session called “A Beginner’s Guide to SOAR: Automating the Basics” to address perceptions about SOAR adoption among security practitioners. This was my first in-person presentation to a live audience in several years because of the pandemic and I was encouraged to find that the session was among the highest attended at the event with well over 200 attendees in the room.

2 million .git directories exposed! Why .git folders are sensitive & how they are leaked publicly

In this video, we look through research by CyberNews and other independent researchers that exposes the huge problem of publicly accessible.git directories hosted on web servers. These folders contain all the metadata from a git repository including all the history, commit data and remote host information. These can contain lots of sensitive information that hackers can use to exploit your website and are often very sensitive. We look in detail at what.git directories are, what sensitive information they contain and how they become accidentally public.

3 Key Trends in Today's It Security Landscape

Here are 3 trends contributing to global cyber insecurity: Today, you have digitization of information, the proliferation of OT and IoT devices, web 3, etc., leading to more vulnerabilities. There are also third-party risks that lead to 70% of breaches. We could be doing a great job protecting our company. But then we may send a document to a law firm that gets hacked, and all of a sudden, our sensitive information is out in the open.

Zenity Named a 2022 IDC Innovator in PaaS that Developers use to accelerate application development and deployment processes

International Data Corporation (IDC) published its annual Innovators report last Friday, November 18th and named Zenity as one of the top five innovative vendors offering a unique PaaS (Platform as a Service) solution that developers are using to accelerate their application development and deployment processes.

Organizations Already Have Your Personal Data For Their Campaigns

Richard Cassidy talks about data breaches in organizations and that some organizations already have your personal data. These organizations can launch campaigns that can affect core belief systems. Richard Cassidy has been consulting businesses on cybersecurity strategies and programs for more than two decades. During his career Richard has been heavily engaged in the design and implementation of infrastructure and cyber security solutions, helping organisations in evolving security, compliance, risk management, data assurance, automation, orchestration and breach response practices.

A Zero Trust approach to identity security

Zero Trust is the term for an evolving set of cybersecurity paradigms that moves an organization’s defensive measures from static, network-based perimeters to instead focus on users, assets, and resources. It is a security mindset where every incoming connection is treated as a potentially malicious request until explicitly verified. This concept was introduced by John Kindervag, one of the world’s foremost cybersecurity experts, and emphasizes three principles.