Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Scale application security with Secure by Design principles

With the alarming number of data breaches and vulnerabilities today, security is now a primary concern for organizations and their customers, but knowing how to efficiently develop and scale secure applications is still a problem. Tackling this challenge requires considering the potential security risks of a new feature or service much earlier in the development cycle, an idea that is foundational to the Secure by Design approach.

Mastering IAM: Market trends & key insights for your project

Join us for the first installment of a three-part webinar series presented by Intragen and OneLogin. Stuart Sharp, VP of OneLogin Product Strategy at One Identity, and Kalle Niemi, Lead Business Consultant at Intragen, dive into the identity and access management (IAM) market. They explore how companies should approach access management projects and cover latest trends and developments in identity security, how to craft an elevated IAM strategy and where the IAM market is headed.

Netwrix PolicyPak

In today's hybrid work environment, users need to access their desktops, laptops and other devices at the office, at home, while traveling, through kiosks and virtually. But many organizations are struggling to manage and secure their IT ecosystem because not all Windows endpoint management software systems were designed for modern distributed scenarios. Netwrix PolicyPak enables you to solve your endpoint management and endpoint protection challenges wherever users get work done, modernizing and extending the power of your existing enterprise technology assets.

Protecto Announces Data Security and Safety Guardrails for Gen AI Apps in Databricks

Protecto, a leader in data security and privacy solutions, is excited to announce its latest capabilities designed to protect sensitive enterprise data, such as PII and PHI, and block toxic content, such as insults and threats within Databricks environments. This enhancement is pivotal for organizations relying on Databricks to develop the next generation of Generative AI (Gen AI)applications.

How Trustwave Protects Your Databases in the Wake of Recent Healthcare Data Breaches

The recent cyberattack on Ascension Medical, Change Healthcare and several UK hospitals is a stark reminder of the vulnerabilities within the healthcare sector. The May 8, 2024, attack disrupted access to Electronic Health Records (EHR) for two weeks across Ascension's 140-hospital system, forced some hospitals to divert ambulances and rely on manual record-keeping, and has led to patient class-action lawsuits regarding potential data exposure.

Search & Spoof: Abuse of Windows Search to Redirect to Malware

Trustwave SpiderLabs has detected a sophisticated malware campaign that leverages the Windows search functionality embedded in HTML code to deploy malware. We found the threat actors utilizing a sophisticated understanding of system vulnerabilities and user behaviors. Let’s break down the HTML and the Windows search code to better understand their roles in the attack chain.