Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Get Visibility Into the Cloud: Craig and Mike Secure the World, One Cloud at a Time

Mike Lossmann and Craig Johnson discuss enhancing cloud visibility for an upcoming audit, demonstrating how to ensure security in cloud environments. Highlights Craig explains the importance of knowing the cloud’s security posture. Forward Enterprise shows full multi-cloud visibility between cloud zones. Analysis reveals potential security gaps. Querying the entire cloud model identifies misconfigurations. Historical data allows for forensic analysis post-breach. Users can prepare for audits without last-minute scrambling.

CVE-2024-38856 -Apache OFBiz Pre-Auth RCE Vulnerability

A new zero-day vulnerability, CVE-2024-38856, has been discovered in the Apache OFBiz open-source enterprise resource planning (ERP) platform, presenting a critical threat to businesses worldwide. This pre-authentication remote code execution (RCE) flaw allows unauthenticated attackers to exploit weaknesses in OFBiz’s request handling, leading to unauthorized access and potentially damaging control over affected systems.

Zero to 80% Faster - How to Leverage AI to Accelerate Security Reviews

Stop wasting your team's time answering security questionnaires. It's time to supercharge the way you complete security reviews by leveraging AI to unlock unprecedented speed and accuracy. We'll explore proven strategies for fast tracking the way your team completes security questionnaires using advanced AI tools and automation. You'll learn best practices like maintaining a centralized knowledge base and leveraging a public-facing trust portal to get ahead of questions.

UN Approves Controversial Cybercrime Treaty Amidst Concerns Over Tech and Privacy

A newly drafted United Nations treaty aimed at combating global cybercrime has sparked significant debate due to its potential implications for technology companies, privacy rights, and digital freedoms. The UN Convention Against Cybercrime, which advanced from committee to the General Assembly on August 8, 2024, could require nations to enforce stringent laws against unauthorized access to information systems and data interception, raising alarms among privacy advocates and cybersecurity experts.

FBI and International Partners Dismantle Dispossessor Ransomware Operation

In a major breakthrough against cybercrime, the FBI, in collaboration with international partners, successfully disrupted the Dispossessor ransomware operation, seizing its servers and websites. This operation, which involved agencies from the United States, the United Kingdom, and Germany, marks a significant step forward in the global fight against ransomware.

"I learned to build shorter, more efficient workflows": users reflect on our advanced certification

Earlier this year, we introduced the advanced certification within Tines University, a new way for our users to deepen their understanding of the platform and build more effective workflows. And I’m thrilled to report that user feedback has been overwhelmingly positive. Over 100 users have already completed the new advanced certification, raising the total number of Tines-certified users to over 500.

Time is of the Essence: Shrinking MTTR in API Security

In the fast-paced world of cybersecurity, every second counts. When an API attack occurs, the speed at which your security team can detect, understand, and respond to the threat can mean the difference between a minor incident and a major data breach. This is where Mean Time to Resolve (MTTR) comes into play. MTTR is a key performance indicator (KPI) that measures the average time it takes to resolve a security incident, from the moment it's detected to the point where it's fully mitigated.

Top 7 Practices to Prevent Data Leakage through ChatGPT

Generative AI (GenAI) tools like ChatGPT have already become indispensable across organizations worldwide. CEOs are particularly enthusiastic about GenAI’s ability to let employees “do more with less”. According to the McKinsey Global Survey on the State of AI in 2024, 65% of organizations already use GenAI tools extensively, and Gartner forecasts that this number will reach 80% by 2026.

CCRI renamed Cyber Operational Readiness Assessment (CORA)

The Command Cyber Readiness Inspection(CCRI) is a comprehensive cybersecurity evaluation and assessment conducted by the United States Department of Defense (DoD). A CCRI serves as a formal inspection aimed at enhancing accountability and bolstering the security posture of DoD Information Networks in alignment with DoD standards, with a specific focus on Command, Mission, Threat, and Vulnerability.

Cybersecurity forecast: Top CIOs reveal their biggest fears and plans

Did you know that 79% of top CIOs believe AI-driven cyberattacks will be the most challenging threat in the next five years? As organizations prepare for an increasingly complex threat landscape, understanding the implementation barriers and budget priorities is crucial for staying ahead. At our recent CyberShield CIO Connect 2024 event in Bangalore, we gathered valuable insights from the top CIOs in South India.