Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Open Source License Management Matters

The ongoing rise in open source vulnerabilities and software supply chain attacks poses a growing threat to businesses, which heavily rely on applications for success. Between 70 and 90 percent of organizations’ code base is open source, while vulnerabilities such as Log4j have significantly exposed organizations to cyberattacks.

Pages

Tines Pages enable you to create a front end for any of your automation pipelines. You can gather and collect data from internal and external sources via a shareable link or URL, or create a centralized landing page for your end user to review any data built in your Story.

Compliance for SMEs: What you need to know

For ensuring compliance in your business practises, it is worth noting that it is just as common (if not more common) for bad actors to target small businesses and small-to-medium-sized enterprises (SMEs). A website can easily get hacked, an email account can be compromised, and sensitive information may even be stolen by employees. These are just a few common examples of how data can be breached.

How to Stay Compliant with HIPAA Password Requirements

The Health Insurance Portability and Accountability Act (HIPAA) is U.S. legislation that sets national privacy and security standards to protect the privacy of patient health information and prevent data breaches. In addition to doctors, hospitals, other healthcare providers, health insurance companies and “business associates” of healthcare organizations fall under HIPAA regulations.

LockBit ransomware gang says sorry, gives free decryptor to SickKids hospital

Do ransomware gangs actually have a heart? Perhaps... Just days before Christmas, on the night of Sunday 18 December 2022, Canada's Hospital for Sick Children (better known as SickKids) was hit by a ransomware attack. The Toronto-based teaching and research hospital reported that the attack had impacted its internal systems, phone lines, and website.

Attack Surface Management vs. Vulnerability Management: What's the Difference?

Attack surface management (ASM) and vulnerability management (VM) are often confused, but they’re not the same. The primary difference between the two is scope: Attack surface management and external attack surface management (EASM) assume that a company has many unknown assets and therefore begin with discovery. Vulnerability management, on the other hand, operates on the list of known assets.