Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Why the CISO & CIO Must Partner for Cyber Resilience

In today’s interconnected world, where the digital landscape is constantly evolving, the threats to an organization’s cybersecurity posture are more sophisticated and pervasive than ever before. Relying on traditional, largely prevention-focused cybersecurity tools and approaches is not enough. Cyber attacks are inevitable.

Deciphering the Loss Exceedance Curve in Cyber Risk Quantification

On-demand cyber risk quantification (CRQ) models have the power to assess an organization’s unique risk profile and, subsequently, generate data-driven insights that facilitate informed risk management decisions. The basis of these insights is grounded on a probabilistic approach to event forecasting, which involves simulating thousands of potential cyber scenarios a business may experience over a given period, typically the upcoming year.

Zenity Researchers Discover Over-Permissions in Salesforce Copilot Topics

The Zenity Labs team has discovered that non-administrator users can modify existing flows that were connected to Einstein by an administrator, influencing Einstein without having the necessary permissions to edit it directly. In doing so, bad actors can easily insert malicious actions into flows that are triggered by business users throughout the enterprise, including phishing attacks, data exfiltration, and more.

What are Netacea Threat Intel Feeds?

Learn more about Netacea Threat Intel Feeds, including how our customers use them to harden existing defenses, from Netacea CTO & co-founder Andy Still. This video explains how Netacea ensures the accuracy of its threat intelligence, the methods of data distribution, and the practical uses of Threat Intel Feeds in blocking malicious traffic and aiding in decision-making processes.

Identifying Insecure C Code with Valgrind and Fixing with Snyk Code

C and C++ remain foundational in critical software development. These languages power a wide array of systems, from embedded devices to high-performance applications in manufacturing, operational technology (OT), and the industrial market. Their efficiency, control over system resources, and performance make them indispensable for developers working on mission-critical projects.

Warnings After New Valencia Ransomware Group Strikes Businesses and Leaks Data

A new ransomware operation has started to leak information it claims has been stolen from organisations it has compromised around the world. In recent days Valencia Ransomware has posted on its dark web leak site's so-called "Wall of shame" links to gigabytes of downloadable information that has seemingly been exfiltrated from a Californian municipality, a pharmaceutical firm, and a paper manufacturer.

The Relation Between Breaches and Stock Price Drops

When discussing the consequences of a data breach for organizations, we usually consider three types of damage: financial, legal, and, somewhat more tenuously, reputational. But what about stock prices? One would assume that stock price—an indicator of a business’s overall health and investor confidence—would plummet after a breach, but is this really the case?

How Security Debt Compounds Vulnerability Risk

Organizations often find themselves caught in a perpetual cycle of identifying, prioritizing, and mitigating vulnerabilities that pose the most risk. Amid this ongoing battle, a significant challenge is often overlooked: security debt. Much like technical debt, security debt refers to the accumulation of unresolved vulnerabilities within an organization’s systems and software.

Nightfall Named A Leader in Data Loss Prevention by G2

Data security leaders, take note: Nightfall has emerged as a frontrunner in G2's Fall 2024 reports, securing top positions in Data Loss Prevention Software, Data Security Software and Sensitive Data Discovery Software categories. This achievement reflects our unwavering commitment to excellence, as well as your trust in our AI-powered solutions. We extend our deepest gratitude to our valued customers and supporters, as your feedback helps us to drive innovation.