Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

More than 180,000 Carvin Software Customers At Risk Because of Recent Data Breach

Carvin Software is a massive company based in Gilbert, Arizona. The company creates specialized software solutions for business owners and individuals throughout the country. Carvin specializes in construction software but offers staffing solutions and other types of software services as well. A large variety of companies work with this organization, including Apple Staffing, Ace Personnel, Labor Force, and more.

Keeper for Teams and Small Business 3 Minute Demo

Introduction Keeper eliminates the pain of having to remember passwords while protecting your business from password-related data breaches and cyberthreats. Keeper stores and protects your website passwords, financial information and other sensitive documents in an encrypted vault. Keeper can generate unique, secure passwords for you that you can unlock with a single Master Password. Keeper makes it easy to login to websites without having to remember passwords ever again.

Unveiling the Ethics of Morality in AI: Who Determines What's Right? - Paul Dwyer

In this thought-provoking video, we delve into the pressing issue of ethics within AI development. Join us, Paul Dwyer and James Rees, as we explore the questionable decisions made by a small group of individuals, often young programmers in California, who dictate what is considered ethically correct in software development. We examine real-life examples, such as image search engines favoring certain races and even identifying different ethnic groups as distinct species. It's absurd that such biases persist. But the ethical concerns don't end there.

SafeBreach Coverage for US-CERT Alert (AA23-131A) - Exploit CVE-2023-27350 in PaperCut MF and NG

On May 11th, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released an advisory highlighting the active malicious exploitation of CVE-2023-27350 in PaperCut MF and PaperCut NG software by a threat actors including one known as the Bl00dy Ransomware Gang. The US-CERT Alert (AA23-131A) Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG includes detailed information about this investigation (along with attacker TTPs and IOCs).

Congrats on your SOC 2 Report! Here's What to Do Next

After tons of hard work, your company has successfully completed a SOC 2 audit and received a well-deserved SOC 2 report! Congratulations! Receiving your SOC 2 attestation is no easy feat, and it’s a significant milestone that demonstrates your company’s commitment to security and trust assurance. If you’re not sure what to do next, no worries – the hard part is done.

API Security for Fintech SaaS | Getting the Most Out of a WAF | Val (Co-Founder & CTO, FISPAN)

In this podcast, Val Novikov (Co-Founder & CTO, FISPAN) talks to Venky about the API security challenges while integrating with proprietary Banking applications and ERP systems. He also discusses why Fintech SaaS start-ups require a deep investment of time, resources, and money in cyber Security right from day zero of the product development. Here are some of the key highlights from the discussion .

Software Composition Analysis Explained

Open source code is everywhere, and it needs to be managed to mitigate security risks. Developers are tasked with creating engaging and reliable applications faster than ever. To achieve this, they rely heavily on open source code to quickly add functionality to their proprietary software. With open source code making up an estimated 60-80% of proprietary applications’ code bases, managing it has become critical to reducing an organization’s security risk.

How to Establish Cross-Border Transfer Systems that Help Protect Privacy

Cybersecurity, privacy and data flows will be key topics at this year’s G7 in Japan. Against this backdrop, it has been a year since last year’s amendments to the Act on Protection of Personal Information (APPI) introduced revised data breach reporting and cross-border data flow rules. Meanwhile, developments in the Asia-Pacific (APAC) region have introduced data localization obligations in a variety of countries.