Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CVE-2024-29847: Ivanti Addresses Maximum Severity RCE Vulnerability in Endpoint Manager

On September 10, 2024, Ivanti released fixes for CVE-2024-29847, a maximum severity vulnerability in Ivanti Endpoint Manager (EPM). This flaw, found in the agent portal of specific EPM versions, allows Remote Code Execution (RCE) by an unauthenticated attacker due to improper deserialization of untrusted data.

Demystifying Data Protection in the Cloud: Runtime vs. At Rest

In the dynamic landscape of data security, navigating the complexities of modern architectures requires a sophisticated approach. The exponential growth of data and the proliferation of cloud services require advanced security strategies that can adapt to rapidly changing conditions. Traditional methods of data protection, while foundational, often fall short in addressing the needs of today’s fast-paced cloud environments.

Protect Every Identity with CyberArk's Intelligent Privilege Controls | CyberArk

In today's world, more employees than ever—across IT, workforce users, developers, and even machine identities—require access to sensitive data, increasing the risk of identity-based cyberattacks. With over 90% of organizations falling victim to such attacks, securing every identity is critical. Enter CyberArk's Intelligent Privilege Controls. These dynamic security measures adapt in real-time to protect high-risk access, ensuring the right users access the right information at the right time.

Evolving the Netskope Risk Exchange Ecosystem

The adoption of cloud services, hybrid workforces, the rapid emergence and use of generative AI (genAI) along with the evolving regulatory environment are forcing security and risk management (SRM) leaders to enhance their SRM spending. Gartner forecasts global SRM spending to grow 14% in 2024. Moreover, worldwide end-user spending on SRM is projected to total $215 billion in 2024, an increase of 14.3% from 2023, according to a new forecast from Gartner, Inc.

Unleashing the Power of Proactive DEM Enterprise

In today’s fast-paced digital world, maintaining seamless connectivity and an optimal user experience is critical. Organizations often struggle with limited network visibility, difficulty in diagnosing and resolving issues, and a lack of comprehensive insights into SASE performance. These challenges can lead to increased administrative burdens and compromised user satisfaction.

Cloud TAP Arrives for Traffic Packet Captures

Netskope customers now have the option for traffic packet captures for Netskope Intelligent SSE for egress traffic from remote users or offices to the Netskope One cloud platform. Key to enabling this new capability is the NewEdge private network where Cloud TAP is available across the globe in data centers. Networking, infrastructure and operations, and security teams often require the following using network and cloud TAPs.

JFrog Unveils First Runtime Security Solution to Deliver Complete Software Integrity and Lineage from Code to Cloud

When it comes to software supply chain security, we all do everything we can to prevent insecure software from being released into production. Hence we see software supply chain security shifting left to discover potential threats as early as possible in the software development lifecycle. But what happens when vulnerabilities are only discovered after an application has been distributed to its operating environment?