Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CVE-2024-20401 and CVE-2024-20419: Critical Vulnerabilities in Cisco Secure Email and Cisco Smart Software Manager On-Prem

On July 17, 2024, Cisco publicly disclosed critical vulnerabilities in Cisco Secure Email Gateway (SEG) and Cisco Smart Software Manager On-Prem (SSM), identified as CVE-2024-20401 and CVE-2024-20419 respectively. Both of these vulnerabilities may allow for unauthenticated administrative actions to be taken by threat actors when exploited.

Migrating from legacy SOAR platform to Tines: a step-by-step guide

In this blog post, Martin Moroney, Customer Success Engineering Manager at Tines shares lessons on migrating from a legacy SOAR platform, based on his experience in overseeing dozens of successful migrations. Enterprise system migrations are complex projects, with intimidating challenges that require meticulous planning and execution. This complexity is amplified in the context of systems that leverage many integrations to support complex workflows.

Best Practices for Effective Vulnerability Management

When it comes to the world of cybersecurity, vulnerabilities are everywhere, just waiting to be exploited. Vulnerability management is the systematic process of identifying, assessing, prioritizing, and mitigating security vulnerabilities in IT systems, applications, and networks. It aims to reduce the risk of exploitation by continuously monitoring for weaknesses and applying necessary security measures.

What Healthcare Providers Should Do After A Medical Data Breach

Healthcare data breaches are on the rise, with a total of 809 data violation cases across the industry in 2023, up from 343 in 2022. The cost of these breaches also soared to $10.93 million last year, an increase of over 53% over the past three years, IBM’s 2023 Cost of a Data Breach report reveals. But data breaches aren’t just expensive, they also harm patient privacy, damage organizational reputation, and erode patient trust in healthcare providers.

Ransomware: Attackers resort to old-school techniques and minimal investment

The modus operandi of cybercriminals is constantly changing. It comes as no surprise that, every so often, hackers switch up their methods to become more evasive. However, contrary to what we might imagine, these changes don’t always have to be innovative, or involve new attack strategies. Cybercriminals are increasingly opting to employ old-school techniques, and couple this with minimal investment.

Is your IP safe from China? The US Government doesn't think so.

An Economist article published in June 2024 claimed that China is actively targeting US SMEs for long-term sabotage and for financial gain through sustained IP theft. With China using previously undetected methods of ‘cyber warfare’, it’s increasingly important that US companies adopt Zero Trust protection for their most valuable IP data.

Emerging technologies

In this insightful discussion, Ashok Kumar Ratnagiri, Associate VP of Information Security at EdgeVerve and Co-Founder of Security BSides Bangalore Community shares his valuable perspectives on the latest technologies and best practices for detecting and preventing ransomware attacks. As ransomware threats continue to evolve and pose significant risks to businesses, it's crucial for organizations to stay ahead of the curve.

From Legacy Systems to IoT: Protecting Critical Infrastructure Against Evolving Threats

The explosive growth in connectivity and the geopolitical environment is putting critical infrastructure around the world at risk. Connecting legacy industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that critical infrastructure runs on to IT environments, Internet of Things (IoT) devices, and out to the Internet makes it easier for cybercriminals and state-sponsored groups to gain access to systems and conduct malicious activities.

#DevSecOps Essentials: Operating Confidently with Trusted Packages

Join JFrog’s Senior Solution Engineer, Mike Holland, and Technical Success Manager, Harpreet Singh, as they showcase the power of the JFrog Software Supply Chain platform. Designed to detect third-party components, track dependencies, and enforce compliance, this platform is essential for efficient and reliable software development. In this session, you'll learn.