Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Solving the cybersecurity skills shortage

Grand View Research predict that USA demand for MSP services will double by 2030, a compound annual growth rate of 13%. It’s a similar story in most developed markets as businesses seek to outsource their non-core IT activities to experts. Such a strong sellers' market would normally mean easy growth. But MSPs cannot hope to recruit and train sufficient cyber security engineers. America has a 500,000 strong cybersecurity job gap.

Top open-source CSPM projects to secure your cloud infrastructure

As more organizations move their critical infrastructure to the cloud, ensuring security has become a top priority. This is where Cloud Security Posture Management (CSPM) comes in. CSPM solutions validate the configuration of cloud services from a security perspective, ensuring alignment with best practices and compliance frameworks such as CIS Benchmarks, PCI-DSS, NIST, and others.

Physical Security In The Age Of Digital: Access Control System Vulnerabilities

Access control systems are the physical form of the layers of data, credential and identity controls underpinning the systems relied on every day. Yet, they can be an afterthought; even the most high-profile breaches of physical security systems can take years to rectify. Security Week highlights the vulnerabilities affecting Nice Linear, a widely used proprietary system in the world of smart homes. Over 2,500 individual vulnerabilities flagged in 2019 alone.

Empowering Teams for Better Security: A Conversation with Jigar Shah - Secrets of AppSec Champions

Developing a Security Culture: In today's highly digital and interconnected world, cybersecurity isn't just an IT issue; it's everyone's responsibility. Creating a robust security culture within your organization involves integrating security awareness into your daily operations. Train your employees, provide adequate resources, and define clear roles and responsibilities for security champions and influencers.

What is Enterprise Attack Surface Management?

The rapid expansion of the digital landscape adds increasing complexity to cybersecurity, especially for enterprises that could have up to 100,000 vendors in their supply chain. Addressing these challenges requires implementing an Attack Surface Management (ASM) strategy tailored to enterprise businesses' unique risk profiles. This post outlines the importance of ASM for enterprises and offers a strategy for ensuring its effective implementation.

UpGuard's Cyber Risk Ratings: Enhancing Risk Categorization for 2024

Each year, we revisit our risk rating system to ensure it best reflects the needs of security practitioners safeguarding their organizations and supply chains. For our 2024 update, we’ve made two closely related changes: we’ve recategorized some of our existing findings to make an organization’s risk profile more understandable and recalibrated our scoring algorithm to more clearly illustrate the impact of specific risks.

Windows Vulnerability Exploited Using Braille 'Spaces' in Zero-Day Attacks

A recently addressed Windows MSHTML spoofing vulnerability, tracked as CVE-2024-43461, has been revealed to have been actively exploited in zero-day attacks by the Advanced Persistent Threat (APT) group, Void Banshee. Initially unmarked as exploited, Microsoft later updated its advisory to confirm that the vulnerability had been abused in attacks prior to its fix.

Meet Snyk for Government: Our developer security solution with FedRAMP ATO

The Snyk team is excited to announce that our FedRAMP sponsor, the Center for Medicare and Medicaid (CMS), has granted authorization (ATO), enabling their teams to leverage our public sector offering, Snyk for Government (SFG). This stage signifies that we are almost at the finish line of the FedRAMP process and points to our continued investment and support of public sector organizations in their application security efforts.