Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Datadog Code Security achieves 100 percent accuracy in OWASP Benchmark by using an IAST approach

As application architectures shift to the cloud and the velocity of software delivery accelerates, organizations are seeking more powerful capabilities to identify security vulnerabilities within their production applications. Traditional static application security testing (SAST) tools, by themselves, are insufficient.

The Howler - Episode 8: Andrew Burback, Chief Information Office & SVP of Operations

In this episode, our hosts sit down with Andrew Burback, Chief Information Office & SVP of Operations, as he shares about his journey from accounting to sales operations & IT, his leadership philosophy rooted in his trust of his team, as well as his love for Subway and his go-to sandwich order!

Proactive Measures to Prevent Data Theft

As the world becomes more and more digitally intertwined, the significance of data security cannot be overstated. Data theft, a critical threat to organizations worldwide, poses severe challenges, jeopardizing both reputational integrity and financial health. This blog post aims to dissect the concept of data theft, understand its impacts on organizations, and outline proactive measures to safeguard against such threats.

Securing Samba Ports: Essential Practices for Safeguarding Your Network

In the vast and interconnected world of information technology, the security of network services and protocols is paramount for organizations of all sizes. Among these, Samba—a free software re-implementation of the SMB/CIFS networking protocol—plays a crucial role in facilitating file and print services across various operating systems, including Unix, Linux, IBM System 390, and Windows.

The Cybersecurity of the S&P 500: An in-depth analysis from SecurityScorecard

In fall 2023, the U.S. Securities and Exchange Commission (SEC) adopted landmark cybersecurity regulations, requiring public companies to disclose “material” cybersecurity incidents within four days. Prior to this, there were very few breach reporting requirements, leaving business leaders, government officials, policymakers, and investors without key information on cybersecurity incidents.

Top 5 SaaS misconfigurations to avoid and why

Cloud storage services and SaaS apps like Google Drive and Microsoft OneDrive provide convenient, scalable solutions for managing documents, photos, and more—making them indispensable for modern work and personal life. However, misconfigured settings and permissions can lead to serious security breaches, noncompliance, and even the loss of customer trust. Let’s explore the 5 most common misconfiguration issues with real-world examples.

Vanta Trust Center, now enhanced with Questionnaire Automation and Vanta AI

As the number and severity of third-party breaches continues to rise, companies are scrutinizing more closely not just how they handle data, but how their vendors do as well. For security leaders, this means more security reviews are coming across their desk everyday. ‍ Limited resources and legacy processes make it hard for security teams to keep up with the pace of business.

17 Ways To Prevent Insider Threats: Steps, Tips & Tools

When you think of cybersecurity, your mind likely goes to external threat actors — malware, ransomware, spearphishing attacks, and other malicious activity. However, it’s crucial to note that 60% of data breaches are caused by insider threats, and a staggering 74% of organizations are at least moderately vulnerable to them. It’s not everybody else your organization needs to worry about; it’s your own people.

Hacking Cybersecurity Training: Escape Rooms & Entrepreneurial Thinking with Amy Stokes-Waters

Join us on this week's edition of the Razorwire podcast where host Jim chats with Amy Stokes-Waters, CEO of The Cyber Escape Room Co. Amy, transitioning from a non-traditional background into cybersecurity, shares her entrepreneurial journey and innovative approach to security awareness training through engaging escape room experiences.

Insider Threats: Shocking Offer Outside Tesla Reveals Cybersecurity Risks

Amy Stokes-Waters discusses a real-world attempt to bribe a Tesla employee for secure access, highlighting the overlooked dangers of insider threats in cybersecurity. Discover the risks businesses face from both internal and outsourced hacking efforts, and why robust security measures are crucial. Tune in for more insights into the hidden world of corporate espionage and its impact on information security.