Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Vanta migrated MDM platforms in just 3 days

In this series, you’ll hear directly from Vanta’s own Security, Enterprise Engineering, and Privacy, Risk, & Compliance Teams to learn about our approach to keeping Vanta secure. We’ll also share some guidance for teams of all sizes — whether you’re just getting started or looking to uplevel your operations.

WatchGuard Joins Data Privacy Framework Program

Our customers benefit from streamlined transactions as WatchGuard has joined the EU-U.S. Data Privacy Framework (DPF), the UK Extension to the EU-U.S. DPF, and the Swiss-U.S. DPF. This allows our European Economic Area (EEA) and UK customers to freely transfer personal data to WatchGuard in the U.S.

SAST vs. DAST for Security Testing: Unveiling the Differences

Application Security Testing (AST) encompasses various tools, processes, and approaches to scanning applications to uncover potential security issues. Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) are popularly used security testing approaches that follow different methodologies of scanning application codes across different stages of a software development lifecycle.

Cisco IOS XE Privilege Escalation (CVE-2023-20198) - Cato's analysis and mitigation

All secured webservers are alike; each vulnerable webserver running on a network appliance is vulnerable in its own way. On October 16th 2023 Cisco published a security advisory detailing an actively exploited vulnerability (CVE-2023-20198) in its IOS XE operating system with a 10 CVSS score, allowing for unauthenticated privilege escalation and subsequent full administrative access (level 15 in Cisco terminology) to the vulnerable device.

CISO Panel Discussion on Application Security

In this CISO panel discussion, join Kiran Belsekar, EVP – CISO & IT governance, Aegon Life, Manoj Srivastava, CISO, Future Generali and Ashish Tandon, Founder and CEO, Indusface. They cover a variety of topics including: Top challenges facing the office of the CISO Alert fatigue and steps to reduce it Top threat vectors faced by the insurance industry in India The rising threat of LLMs API security and best practices to secure APIs Fighting the perception battle and positioning security teams as business enablers Cutting through vendor noise and picking the right tech stack.

Get More Out of Mend.io with Repository Integrations

How do you build a successful AppSec program? Today, we’re focusing on an area where we have great evidence for a specific best practice – Repository Integration. Choosing where to deploy SCA scans can have a major impact on the success of your AppSec program. You can boost the value of Mend SCA by scanning in your repositories, and we want to show you how!