Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Optimal Cyber Risk Management Tools to Streamline DORA Compliance

‍Over the past few decades, money has steadily transformed from a material entity to a digital one. Worldwide, people rely on the cyber realm to pay their bills, shop for food, and perform many other everyday activities. Corporations, too, particularly following the 2020 pandemic, are largely dependent on cloud-based operations, utilizing various management platforms and storing massive amounts of data online.

Your First 90 Days in a New AppSec Role with Anthony Israel-Davis - Secrets of AppSec Champions

Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot of good takeaway's that you can use almost immediately.

Creating Visibility In Your Digital Environment with Attack Surface Management (ASM)

In today’s IT environments, creating visibility in your digital environment with Attack Surface Management (ASM) is crucial for maintaining robust cybersecurity. ASM provides essential insights and tools to identify and protect your organization. This blog addresses several key questions that ASM helps answer, bolstering your resilience against cyber threats.

Sentinels of Ex Machina: Defending AI Architectures

The introduction, adoption, and quick evolution of generative AI has raised multiple questions about implementing effective security architecture and the specific requirements for protecting all aspects of an AI environment as more and more organizations begin using this technology. Recent security reports on vulnerabilities that expose Large Language Model (LLM) components and jailbreaks for bypassing prompting restrictions have further shown the need for AI defenses.

What is the Most Frustrating Experience in SOC 2 Audit and Attestation?

The SOC 2 (Service Organization Control 2) audit and attestation process is something that has been devised by the American Institute of Certified Public Accountants (AICPA) in order to ensure that organizations which provide services have secure procedures to govern data so as not to compromise the welfare of their clients. For this reason, achieving SOC 2 compliance is crucial for service agencies especially those involved with sensitive customer data.

Azure Just-in-Time Access Simplified

In today’s rapidly evolving cloud landscape, organizations are grappling with the intricate challenge of striking a delicate balance between ensuring robust cybersecurity measures and facilitating seamless operational efficiency. As cloud adoption continues to surge, the traditional approach of granting standing privileges to users has become an increasingly significant security vulnerability.

3 Types of Bot Attacks to Guard Against

Bot attacks constitute a major danger to businesses and individuals. For five consecutive years, the percentage of global web traffic connected to bad bots has increased, reaching 32% in 2023, a 1.8% increase from 30.2% in 2022, while human traffic represented only 50.4%. These nefarious bots are designed to breach a system, access confidential files illegally, and disrupt normal operations, which leads to severe financial and reputational consequences.

SecurityScorecard and AWS Help Make Secure Software Procurement Faster and Easier

Organizations increasingly rely on third parties for business operations, and as a result are working with more digital suppliers than ever. According to Gartner, 60% of organizations work with more than 1,000 third parties and this number will grow. High-profile vulnerabilities such as Log4Shell are a constant reminder of the risks posed by a breakdown in the software supply chain. This has spurred enterprises to increase the rigor of software risk assessments to ensure supply chain security.