Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

API Attack Surface: How to secure it and why it matters

Managing an organization’s attack surface is a complex problem involving asset discovery, vulnerability analysis, and continuous monitoring. There are multiple well-defined solutions to secure the attack surface, such as extended detection and response (EDR or XDR), security information & event management (SIEM), and security orchestration, automation & response (SOAR); despite that, these tools often do not prioritize APIs.

HIPAA Compliance Mistakes To Avoid

Avoiding HIPAA compliance mistakes is crucial to safeguarding patient data and avoiding hefty fines. Common errors like improper data storage and insufficient employee training can put your practice at risk. Stay compliant by knowing the pitfalls and implementing best practices to protect sensitive information.

Detect Secrets In Microsoft Teams With GitGuardian

GitGuardian can now help you find and remediate secrets exposed in your Microsoft Teams channels. We have extended the real-time detection capability of our secrets detection platform to include the popular communications tooling to help teams better fight secrets sprawl throughout their organizations Once integrated, whenever a plaintext credential is accidentally posted to Teams messages, GitGuardian will create an alert and the incident will appear in your GitGuardian dashboard, allowing you to remediate it like any other leaked secret.

3 ways AppSec modernization is a game-changer for financial services

Today’s established financial services companies face high pressure from their competition. Many of them find that they must provide an innovative, customized customer experience (CX) or lose out to FinTech disruptors who are already doing CX well. As a result, these businesses are prioritizing innovative, feature-rich applications and adopting the latest and greatest in software development to speed up release cycles and increase productivity.

CVE-2024-6633: Critical Credential Vulnerability Affecting Fortra FileCatalyst Workflow

On August 27, 2024, Fortra published a security advisory regarding a critical credential vulnerability in FileCatalyst Workflow, identified as CVE-2024-6633. FileCatalyst Workflow is a managed file transfer solution used for exchanging large files across networks.

How a Security Operations Approach Can Prevent Man-in-the-Middle Attacks

Here’s an endpoint you don’t often think about: your car. But if it’s Wi-Fi enabled, as many new models are, that means it resides at the end point of a network connection and can communicate on that network, making it an endpoint.

Trilio: The Perfect Backup Solution for Red Hat OpenStack Services on OpenShift

As infrastructure continues to evolve for scalability, tenancy and efficiency, there is a growing need for solutions that can bridge the gap between mature cloud offerings such as OpenStack and the ease of deployment, flexibility, and elasticity provided Kubernetes. Red Hat OpenStack Services on OpenShift or “RHOSO” offers a compelling solution for organizations looking to achieve this goal.

NEW: ARMO Platform Introduces Auto-Generation of Seccomp Profiles

We are thrilled to announce the latest enhancement to ARMO Platform: Seccomp Profiles Leveraging eBPF. This feature uses eBPF to take the guesswork out of creating seccomp profiles. Thus, benefiting from the added security seccomp profiles provide, without the risk of “breaking” applications.

A Deep-Dive Into Initial Access Brokers: Trends, Statistics, Tactics and more

Initial Access Brokers (IABs) are threat actors who infiltrate networks, systems, or organizations and sell this unauthorized access to other malicious actors. Instead of executing the entire cyberattack, IABs focus on the initial breach and monetize it by selling access to compromised systems. They assist ransomware operations, particularly RaaS schemes, by streamlining attacks and reducing workload at the start.

"It's so important that the CISO gets a seat at the table": a Q&A with Trace3's Gina Yacone

A leading voice in cybersecurity, Gina Yacone is a trusted advisor to senior security leaders, guiding them through emerging trends and recommending strategies to strengthen defenses. She was also recently named Cybersecurity Woman Volunteer of the Year 2024. As regional and advisory CISO at the elite technology consultancy Trace3, she also participates in the Trace3 AI Center of Excellence (CoE) Champion Program, keeping her at the forefront of AI and security innovation.