Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mend Renovate Enterprise Cloud: Dependency Updates at Scale

If there’s one thing development and security teams can agree on, it’s that updating dependencies is a worthwhile endeavor. Keeping open-source dependencies up to date reduces bugs—both now and in the long run. And whether those bugs are security vulnerabilities or functional issues, everyone is happy to see them go.

Mitel MiCollab Vulnerabilities: CVE-2024-35286 and CVE-2024-41713

Mitel’s MiCollab Unified Communications solutions are widely used by businesses to streamline communications. However, two critical vulnerabilities, CVE-2024-35286 and CVE-2024-41713, have been identified across several versions of Mitel MiCollab. CVE-2024-35286 has been identified in versions 9.8.0.33 and earlier and CVE-2024-41713 has been identified in versions 9.8 SP1 FP2 (9.8.1.201) and earlier.

The Critical Evolution of Cloud Detection and Response

Cloud security has reached an inflection point. Organizations have accelerated their cloud adoption and must navigate a complex threat landscape where workloads spin up and down in seconds, applications deploy continuously and identities span multiple services and providers.

Securely Deploying & Running Multiple Tenants on Kubernetes

As Kubernetes becomes the backbone of modern cloud native applications, organizations increasingly seek to consolidate workloads and resources by running multiple tenants within the same Kubernetes infrastructure. These tenants could be: While multitenancy offers cost efficiency and centralized management, it also introduces security and operational challenges: To address these concerns, practitioners have three primary options for deploying multiple tenants securely on Kubernetes.

Assembling the Dream Team: Building a High-Performing Supply Chain Incident Response Team

Organizations are increasingly reliant on third-party vendors. While this enables agility and innovation, it also introduces significant security risks. Cyberattacks originating from the supply chain are on the rise, underscoring the critical need for robust security measures. This article explores the key elements of building a high-performing supply chain incident response team to effectively mitigate and respond to these threats.

Is Your Organization Prepared for Tomorrow's Risks? Announcing Tanium Integrated Risk Management for ServiceNow

As IT infrastructures grow more complex and cyber threats escalate, CIOs are searching for a powerful new solution for risk and compliance. Tanium Integrated Risk Management (IRM) for ServiceNow addresses these challenges with an integrated platform that transforms visibility, control, and remediation with real-time, unified data for IT, security, and risk teams.

How Generative AI is Shaping the Future of Cybersecurity: Key Insights for CISOs and Enterprises

The increasing adoption of generative artificial intelligence platforms by threat actors, cyber defenders, and the average organization will present enterprises with an unprecedented number of cybersecurity issues in the coming years, according to a new Gartner report and information from Trustwave subject matter experts.