Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Q&A with Martin Kraemer on Information Sharing in Cybersecurity

Recently, Dr. Martin J. Kraemer, Security Awareness Advocate at KnowBe4, and Dr. William Seymour, Lecturer in Cybersecurity at King’s College London released a Whitepaper called: “Cybersecurity Information Sharing as an Element of Sustainable Security Culture,” which examines how people consume and share cybersecurity information, revealing the role that workplace training plays in fostering information sharing among colleagues.

The Microsoft Security Score: The Future Benchmark of Enterprise Security and Trust

Trustwave has engaged with hundreds of enterprise customers across Australia and worldwide, and one overarching theme continues to emerge. Cybersecurity is no longer an IT problem; it is a core business concern. Executives, board members, procurement teams, and even marketing departments are beginning to realize that security is not just about preventing breaches but about establishing trust, enabling business, and gaining competitive advantage.

Connect and secure from any network to anywhere

Build your new corporate network with Cloudflare, connecting any network into our modern SASE platform. In this video learn all the different methods of connecting networks to Cloudflare and what services can then be used to improve security and performance. Chapters: Watch the rest of the videos in our series to learn more about Cloudflare's SASE platform. Dive deep into the architecture of how our SASE platform works by reading our reference architecture content.

Jit + Orca Security: Correlate Cloud and Application Security for Smarter Risk Management

Today, we’re excited to announce Jit’s integration with Orca Security! This partnership enables security teams to correlate cloud security risks with application security risks to understand how the security of one resource impacts another. Security teams today struggle with siloed tools and security insights, as well as inconsistent prioritization methods across tooling.

It's Time Developers Say Goodbye to Code Vulnerability Backlogs

Without the widespread developer adoption of security tools, it's extremely difficult to build secure applications in the cloud. Developers aren’t security experts, which is why development teams will leverage application security tools – like SAST, SCA, IaC Scanning, secrets detection, and other technologies – to scan their code and surface vulnerabilities. These tools are often resisted by developers.

Announcing the Launch of the COR Compliance Package: Stay Ahead of DORA Regulations

Starting this year, financial institutions (FIs) and crypto-asset service providers (CASPs) in the EU are now required to ensure compliance with complex frameworks that protect digital infrastructure and financial services.

Fireblocks x AWS: A Blueprint For Tokenized Asset Deployment and Management

The real-world asset tokenization market is projected to reach $200 billion by 2030, underscoring the enormous potential in this space. However, bringing digital assets to market presents non-trivial considerations and a need for infrastructure providers and software vendors to collectively fulfill functional and non-functional tokenization platform requirements.

The Definitive API Security Testing Checklist [XLS download]

What would happen if a malicious actor managed to access your API without authorization and compromise sensitive user data? The repercussions can be horrendous. You could incur significant financial losses or even worse harm your reputation. There is also a higher risk of security, just last year a 37% increase in API security incidents were reported. which means that developers of API-based goods and services need to pay extra attention to this.

ADKAR: 5 stages to manage the human side of SASE change

Change isn’t optional—IT leaders know this better than anyone. IT has always been the backbone of the business, keeping everything secure, connected, and efficient. But the demands on IT—and the business—have changed. Cloud adoption, hybrid work, competitive pressures, and rising costs have exposed the cracks in legacy architectures and pushed them past their limits.