June 2021

Featured Post

6 Ways to Support a Remote DevOps Team

Remote working is here to stay, so it's vital that businesses understand how to get the best out of their staff. For some roles, working remotely is easier than others - DevOps employees, for example, can face challenges if they're not fully supported within the organisation. In a distributed workforce, there's a higher risk of security issues and application problems, so it's crucial that organisations support them to keep the organisation running smoothly. Here are 6 ways to do just that.
cyberint

4 Steps To Lower Your Digital Risk

Business decision-makers are inundated today with messages about the importance of digital transformation and innovation. If you want to stay ahead of the competition, you're told, you need to take full advantage of the cloud, move to microservices, replace your VMs with containers and so on. Yet what often gets lost or overlooked in those conversations is the digital risk that goes hand-in-hand with digital transformation.

alienvault

AI everywhere: How AI is being applied in 4 different fields

Image Source: Pexels This blog was written by an independent guest blogger. Historically, the idea of artificial intelligence (AI) saturating our world has been met with suspicion. Indeed, it’s one of the more popular tropes of science fiction — learning machines gain sentience that helps them take over the planet.

SecurityScorecard

Cybersecurity Due Diligence in M&A

Mergers and acquisitions (M&A) enable companies to add products and services to their portfolios, giving them a way to scale their business. To gain true visibility into a company’s long-term impact on your organization’s bottom line, you need to understand all assets and liabilities, including digital ones.

Snyk

Snyk at RSAC 2021 - ML in SAST: Distraction or Disruption

Machine learning is a loaded term. While machine learning offers amazing potential for advancing technologies, it often gets used as a marketing buzzword describing glorified pattern recognition. So it becomes increasingly difficult to know if the application of machine learning to existing technology is going to break new ground or sell more licenses. That’s the problem that Frank Fischer, Product Marketing for Snyk Code, explores in his RSAC 2021 talk ML in SAST: Disruption or Distraction.

Create a New Application Profile in the Veracode Platform

In this video, you will learn how to create a new application profile in the Veracode Platform. Users with the Creator or Security Lead role on the Veracode Platform can create application profiles. The application profile describes your application, identifies the policy to evaluate the application with, and provides metadata that enables a thorough analysis of security performance across all the applications in your organization.
devo

How Cloud Evangelists Face - and Overcome - Cloud-Computing Security Challenges

This is the third in a series of posts examining the recent Devo research report, Beyond Cloud Adoption: How to Embrace the Cloud for Security and Business Benefits, which is based on a survey conducted by Enterprise Strategy Group (ESG). This time, we’ll take a look at the cloud-computing security challenges Cloud Evangelists face. Let’s begin by explaining how we define that group.

synopsys

Optimizing software composition analysis for developer workflows with Black Duck Rapid Scan

Black Duck Rapid Scan enables developers to check for security or policy violations without disrupting development process. When the first software composition analysis (SCA) tools made their entrance into the market, their focus was on license compliance. As open source grew in popularity, SCA tools expanded to include vulnerability management, helping to reduce the attack surface for organizations leveraging open source.

Ransomware Has Evolved, And So Should Your Company

Ransomware is typically initiated via phishing or social engineering tactics, these attacks often take advantage of human error for the successful delivery of the malware. These criminal organizations are impartial to the size of your organization. They target any company with data, and if you don't pay the ransom, your information could be posted to a public forum or sold on the Dark Web for profit. Most companies unfortunately are forced to pay due to system failure and file corruption.

Secure Coding Practices to Prevent Vulnerabilities in SDLC

Unlocking the Secrets of building a secure app Under 60 Minutes Build a culture of Secure Programming in your engineering team . With the amount of (attempted) security breaches and high paced sprint cycles, securing your mobile applications from day 1 is a driving force to ship applications at speed.
teleport

Securing Access to Production MySQL Databases.

MySQL brands itself as the world’s most popular open source database. As popular as MySQL database is among developers and SQL enthusiasts, it is equally popular amongst hackers. Misconfigured server access, overprivileged roles, and weak authentication schemes are the most common security issues in MySQL database. While access control features provided by MySQL are adequate enough at the SQL level, it is error-prone to manage access at the operational level.

lookout

Four Steps to Modernizing Government Cybersecurity with Zero Trust based on the Executive Order

The pandemic has accelerated digital transformation and telework on a scale never seen before. Employees are working from anywhere and collaboration in the cloud has skyrocketed. But this new environment has expanded the cyber attack surface, compromising critical U.S. infrastructure and lives of our citizens. The recent slew of major cyber attacks including SolarWinds, Microsoft Exchange and Colonial Pipeline, has moved cybersecurity improvements to the top of the agenda for the U.S.

alienvault

Empowering women in the field of ethics and compliance

Ethics and compliance is becoming a burgeoning industry as an increase in government regulations in areas such as sustainability, diversity, and data privacy make compliance an important focus for companies. It’s especially important in tech companies as the ever-growing risk of cybersecurity breaches requires that security teams be vigilant in protecting sensitive data.

SecurityScorecard

What If You Had Advance Notice of a Ransomware Attack?

One of the worst things about ransomware attacks isn’t just the mayhem they cause as your data is encrypted by criminals and your business is put on hold — it’s not knowing when they’ll happen. But what if you had some advance notice about the next cyberattack before it hit? What if you could find out if your data was up for bid on the dark web?

reciprocity

What Is a Quality Management System?

A quality management system (QMS) is a system that documents the policies, business processes, and procedures necessary for an organization to create and deliver its products or services to its customers, and therefore increase customer satisfaction through high product quality. In short, a QMS helps a company meet its regulatory requirements and customer requirements, and make continuous improvements to its operations.

reciprocity

What Are Audit Procedures for Internal Controls?

Audit procedures are the processes and methods auditors use to obtain sufficient, appropriate audit evidence to give their professional judgment about the effectiveness of an organization’s internal controls. Internal controls are the mechanisms and standards that businesses use to protect their sensitive data and IT systems; or as a means of providing accountability on financial statements and accounting records.

tripwire

Save the Embarrassment: The Value of Two-Factor Authentication on Social Media

These days, it’s not a matter if your password will be breached but when. Major websites experience massive data breaches at an alarming rate. Have I Been Pwned currently has records from 543 sites comprising 11.4 billion accounts. This includes well-known names like Wattpad, MySpace, and Facebook. This is an 84% increase in the number of sites and a 115% increase in the number of accounts from when I published the first version of this article in 2018.

reciprocity

Reciprocity Named Leader for GRC Platforms in G2 Summer 2021 Grid Report

ZenGRC Platform Designated ‘Leader’ and ‘High Performer’ by Users SAN FRANCISCO – June 29, 2021 – Reciprocity, a leader in information security risk and compliance, today announced its ZenGRC® platform was recognized as a Leader in G2’s Summer 2021 Grid for GRC Platforms, and as a High Performer in the Third Party & Supplier Risk Management category.

nightfall

The Basics of PCI Compliance: Merchant Levels and Requirements

PCI compliance isn’t just good for customers; it’s also good for business. Merchants that fall short of PCI compliance standards not only put their customer data at risk, they also may face hefty fines. The PCI Compliance Guide reports that fines and penalties can range from $5,000 to $100,000 per month for the merchant.

netskope

Not Laughing: Malicious Office Documents using LoLBins

Attackers have long used phishing emails with malicious Microsoft Office documents, often hosted in popular cloud apps like Box and Amazon S3 to increase the chances of a successful lure. The techniques being used with Office documents are continuing to evolve. In August – September of 2020, we analyzed samples that used advanced techniques like: In January 2021, we examined samples that use obfuscation and embedded XSL scripts to download payloads.

netacea

Why do we need a MITRE ATT&CK-style framework for bots?

Since launching in 2015, MITRE’s ATT&CK framework has been the cybersecurity industry standard for understanding cyber-attacks and their kill chains. Now the BLADE framework is set to develop a similar understanding of business logic attacks fueled by malicious bots. In this post, we will look at why MITRE ATT&CK is so important and examine why BLADE is needed now more than ever.

Snyk

5 ways to prevent PHP code injection

Following on from my previous post on testing for PHP Composer security vulnerabilities, I thought this post might be useful in helping create more secure applications that prevent PHP code injection. As developers, we build apps to help make end users’ lives easier. Be it entertainment, workplace or social network application, the end goal is to protect the users we build for by ensuring we build security into the code.

veracode

Speed or Security? Don't Compromise

“Speed is the new currency of business.” Chairman and CEO of Salesforce Marc R. Benioff’s words are especially potent today as many organizations small and large look for ways to speed up production during their shifts to digital. In software development, speed is a critical factor. Everything from shifting priorities to manual processes and siloed teams can seriously impede deployment schedules.

forgerock

ForgeRock and Secret Double Octopus Extend Partnership to Make Securing Employee Workstations Easier

Many of us start our day by logging in to a desktop. However, none of us think that this seemingly inane activity is the sole tool protecting crucial corporate information. Employees' workstations are a prime target for malicious actors for apparent reasons – any unauthorized access to a company laptop or desktop can immediately put sensitive data at risk and can easily cause a chain reaction with devastating consequences.

nightfall

Is Dropbox HIPAA Complinant?

Dropbox is known for being a convenient file sharing and storage tool. For over a decade, Dropbox has allowed teams to collaborate cross- functionally by providing a single source of truth. With files being managed and synced to a central location, teams can work together without issues of version control. Even in a post- Google Drive and OneDrive era, Dropbox remains important, as not everyone uses the same productivity suites.

ThreatQuotient

Current Events Have You Worried? Our Program Development Services Can Help.

Sometimes the hardest part of any project is getting started. But when it comes to strengthening your security operations program, the escalation of cyberattacks over the last few months have shown us there’s no time to waste. You need to make sure you’re leveraging threat intelligence throughout your security operations to understand your adversaries, strengthen defenses, and accelerate detection and response.

eventsentry

EventSentry on GitHub: PowerShell module, templates and more!

Since we’ve accumulated a lot of resources around EventSentry that are updated frequently, we’ve decided to launch a GitHub page where anyone can access and download scripts, configuration templates, screen backgrounds and our brand-new PowerShell module that is still under development.

Secure Software Development: How to Check Your Code

In May of 2021, a cybercrime organization called DarkSide successfully locked operators of the Colonial Pipeline, which supplies the east coast with 45% of its petroleum fuel, out of their own software system with a type of malware called "ransomware." True to its name, ransomware returns access to your software (in theory) if you pay a ransom. The result-fuel supplies collapsed across the eastern United States, with gas lines, price spikes, and panic. People began hoarding gasoline in states not even served by the Colonial Pipeline. The US government passed emergency legislation. Even DarkSide seemed shocked at the impact of their cyberattack.
appknox

Appknox adds ioXt Security Compliance Testing for IoT & Mobile Apps

Appknox, a leading enterprise mobile application security solution provider has announced a partnership with ioXt, a global standard for IoT security and standardization of security, privacy, and compliance programs. With the alliance, Appknox will enforce the clients with a Security Pledge that focuses on the security of stakeholders, and devices in the IoT environment.

alienvault

Asset management in the age of digital transformation

Over the past year or so, organizations have rapidly accelerated their digital transformation by employing technologies like cloud and containers to support the shift to IoT and address the expanding remote workforce. This digital shift calls for a new approach to asset visibility as traditional asset administration responsibilities like inventory, software support, and license oversight are often the purview of IT and addressed with IT inventory-focused tools.

SecurityScorecard

5 Cyber Risks SLED Agencies Need to Protect Against

Last year was a tough one for schools, local, and state governments. Not simply because of COVID-19, which forced every local government and school to navigate a pandemic, but also because the pandemic brought with it a different set of dangers. While local governments and schools were trying to figure out remote learning, remote work, and how to run public meetings safely and effectively online, cybercriminals took advantage of the fact that the remote world is new to most small governments.

tripwire

Cybersecurity Challenges in the Construction Industry

Digital transformation is at the heart of every industry. There are no longer any industries that are immune to the rapid adoption of this movement. When we think of the construction industry, we may think back to an image of ironworkers sitting over a city and enjoying a lunch break on a construction beam. However, rapid digitalization has transformed the construction industry and will continue to drive change and encourage innovation.

upguard

Should Australian Businesses Pay Ransoms to Cybercriminals?

The Australian Cyber Security Center (ACSC) strongly advises against paying ransoms of any amount to cybercriminals. In some circumstances, these payments could even be illegal. The Australian government is tightening its cybersecurity regulations to align with the United State's new stance on nation-state threats. As a result, there have been significant changes to how Australian businesses are expected to respond to cyberattacks.

idcentral

Product Update: SMS TxN Extractor-The future of income proof and financial profiling

With our continuous pursuit to help businesses reduce the blind spots in business metrics, we have come up with yet another feature that will prove to be the richest source of financial data, i.e SMS TxN Extractor. SMS was believed to be a dead market until people began to understand the reliability. Apart from the concept of reliability of SMS messaging, texts are quick, cost-effective and results can very quickly be analyzed.

styra

The Open Policy Agent Journey from Sandbox to Graduation

As anyone who has built or introduced a new project or product knows, success doesn’t happen overnight. It takes time and patience. When we first started the Open Policy Agent (OPA) project in 2016, we didn’t just spend all of our time on code — a lot of it was spent building awareness around the project and the community. As OPA started gaining traction, we were encouraged every time we’d hear a developer talk about OPA at a conference or mention it in a blog post.

siemplify

Sitdown with a SOC Star: 11 Questions With Reid Gilman of Watch City Cybersecurity

Our latest edition of “Sitdown With a SOC Star” brings us Reid Gilman, a longtime security operations practitioner (11+ years at MITRE as a lead cyber engineer and 2+ years at Boston Children’s Hospital as a security engineer and architect) who recently launched his own venture. Reid has a passion for helping organizations build maturity, but as you’ll find out, most businesses need to make sure they are sorting the fundamentals first. Please enjoy 11 questions with Reid.

synopsys

How to cyber security: Embedding security into every phase of the SDLC

Creating a secure software development life cycle can lower risk, but security must be embedded into every step to ensure more secure applications. On May 6, 1937, the Hindenburg airship burst into flames while docking, causing 35 deaths and bringing the airship era to a sudden close. In hindsight, it seems tragically obvious. Fill a giant bag with highly flammable hydrogen gas and trouble is bound to follow.

veracode

Too Many Vulnerabilities and Too Little Time: How Do I Ship the Product?

The percentage of open source code in the enterprise has been estimated to be in the 40 percent to 70 percent range. This doesn't make the headlines anymore, but even if your company falls in the average of this range, there is no dearth of work to do to clean up, comply with AppSec policies, and ship the product. Phew! So where do you start when it comes to resolving all the vulnerabilities uncovered in your open source libraries?

forgerock

Identity, Business Agility, and Bird Feeders

Businesses love stability. Yes, they love profits too, but those come when markets are consistent. Unfortunately, the world doesn’t always work this way – things change, markets are volatile, and you must know the risks in trying to stay on a straight path across a moving landscape. Businesses that survive (and thrive) have one thing in common: the ability to be nimble.

Securing DevOps : Security in the Cloud

Key Topics surface possible for a startup, to focus on their product and leave complex infrastructure security and cloud security problems for later on.
  • The need to start segmenting permissions when there are too many people in a team is a natural, and getting into the cloud services and cloud security business knowing that rearchitecting regularly will be needed is healthy.
  • lookout

    Use ZTNA to address requirements VPNs cannot. Here's why.

    I recently hopped on the Endpoint Enigma podcast to talk about virtual private networks (VPNs) and how they’ve been extended beyond their original use case of connecting remote laptops to your corporate network. Even in this new world where people are using personal devices and cloud apps, VPN continues to be the go-to solution for remote access and cloud access. After my conversation with Hank Schless, I was inspired to put some additional thoughts about VPN on paper.

    bulletproof

    EU representation - what UK businesses need to know

    EU representation isn’t a new thing – it’s a core component of the GDPR – but it has become something that UK companies need to be aware of post Brexit. Up until 31st December 2020, UK companies didn’t need to worry about having an EU representative, as the UK was a part of the EU. Now things have changed, and many UK businesses need to find an EU data representative in order to maintain compliance with EU GDPR.

    How Security & IT Teams Can Manage the Shift to the New Normal

    The COVID-19 pandemic has disrupted businesses in ways that few had planned for, resulting in shutdowns, global economic downturn, supply chain volatility, and a sudden uptick in e-commerce and remote work. The disruption is straining security and IT teams who have to quickly respond and adapt to a series of unanticipated business events. How can security and IT teams stay agile, enable business resilience, and manage the shift to the new normal?

    Kickstart Guide to Implementing the NIST Cybersecurity Framework

    Cybersecurity practitioners worldwide use the NIST Cybersecurity Framework to strengthen their security program and improve their risk management and compliance processes. The framework is voluntary, but it offers proven best practices that are applicable to nearly any organisation. However, it can seem daunting at first because it includes so many components.
    netskope

    The Right Steps to SASE: Refactor Internal Data Center Controls to Closed Loop Risk Management

    The following is an excerpt from Netskope’s recent book Designing a SASE Architecture for Dummies. This is the sixth in a series of seven posts detailing a set of incremental steps for implementing a well-functioning SASE architecture. Throughout this series, we repeat that the data center is just one more place people and data have to go—it’s no longer the center of attention.

    netacea

    How can businesses stay ahead of loyalty point fraud?

    In our recent webinar featuring Netacea’s Head of eCommerce, Tom Platt, we explored the rising threat of loyalty point fraud and how businesses can reap the benefits of loyalty schemes while staying protected from attacks and retaining customer loyalty. Watch the full webinar on demand or catch up on the takeaways here.

    Ransomware Attacks in 2021 And How To Prevent Them

    In the last two years, ransomware attacks have drastically increased, and their impact on the organization has become bigger. Bitdefender reports that ransomware attacks increased by 485% in 2020. In this video, we will review what is a ransomware attack and how it spreads across the organization's assets, as well as what types of companies usually get hit by attackers, and how to minimize the risk of getting infected.
    synopsys

    How an open source software audit works

    Open source software audits can identify undetected issues in your codebase. Learn how our audit services can help you understand the risks during an M&A. Most of our clients understand that an open source software audit differs from an automated scan. An audit involves expert consultants analyzing a proprietary codebase using a combination of Black Duck® commercial tools and tools we’ve developed and use internally.

    nightfall

    Is Google Drive HIPAA Compliant?

    Google Drive is one of the oldest and most well known cloud storage and productivity suites. Although Google Drive launched in 2012, Google’s productivity platform dates back to 2006, when Google Docs and Google Sheets first launched. Over the years, Google would more closely integrate these services before moving them under the Google Drive and Google Suite brand. Today, Google Drive and Google’s entire suite of collaborative tools are referred to as Google Workspace.

    QuickTip // Smart Cache

    Egnyte’s Smart Cache hybrid solution ensures users have fast access to content even when they work with large files at locations with low bandwidth. Smart Cache automatically caches frequently accessed files to the on premises storage for access at LAN speed. Once the cached content is no longer in consistent use, it is released, freeing up storage space. And you can sync specific folders to Smart Cache, ensuring users always have access to those folders even in the event of an internet outage.

    Netskope CTE and CrowdStrike Demo

    Together, Netskope and CrowdStrike deliver a comprehensive view of threats across web, cloud, and endpoints and work together to respond more quickly and effectively to those threats. By sharing threat intelligence and investigation artifacts Netskope and CrowdStrike can ensure newly discovered threats are quickly identified, endpoints protected, and the threat neutralized across the organization. Additionally, Netskope is able to identify those endpoint devices that are secured by CrowdStrike and granularly control cloud access and activities of any endpoints where the CrowdStrike agent is not installed.
    cyphere

    How to reduce your attack surface with system hardening in 2021

    The goal of system hardening (or security hardening) is to reduce the attack surface. It includes reducing security risks and removing potential attack vectors. By removing superfluous programs, accounts functions, applications, ports permissions access etc., the reduced attack surface means the underlying system will be less vulnerable, making it harder for attackers or malware to gain a foothold within your IT ecosystem.

    How Much Damage a Ransomware Attack Can Cause

    As soon as you turn on a news channel or try to read the latest broadcast from your favorite site, you can find an article on cybercriminal activity, especially ransomware-type. Ransomware, a highly crippling malware attack on businesses of all sizes and sensitive information, has been in action. You can search now and find several companies getting attacked and losing footing.
    rezilion

    The Top 3 Reasons to Remove Bloated Code

    Many things can slow down the development and deployment of a project. But one of the most significant issues is also wholly manageable: Code Bloat. Bloated code occurs where the runtime environment contains useless pieces of code, like libraries or service binaries, that will invariably lead to software inefficiencies and security vulnerabilities.

    alienvault

    A mid-year update for Cybersecurity - 4 trends to watch

    It is nearing the mid-year point of 2021, and already it can be characterized as” the year of the breach.” Many companies and institutions saw their security perimeters pierced by hackers including the mega-breaches of Solar Winds and the Colonial Pipeline. The scale of penetration and exfiltration of data by hackers and the implications are emblematic of the urgency for stronger cybersecurity.

    ioncube24

    Weekly Cyber Security News 24/06/2021

    A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. Who would be silly enough to try and connect to a weird looking Wi-fi hot spot? Well, try to resist because if you have an iPhone you will break it and TL;DR; you will need to do a factory reset to fix it…

    cyphere

    The 3 Types of Security Controls (Categories, Frameworks and Standards)

    Security controls can be physical or virtual, policies, training, techniques, methodologies, action plan, devices, and customised solutions to avoid, detect, and prevent intruders and minimise the security risk befalling the individual or organisational proprietary information systems, etc.

    Kubernetes Quick Hits: Don't run with privileged:true in you Kubernetes SecurityContext

    In this episode of our Kubernetes Quick Hits video series, Eric Smalling–Sr. Developer Advocate at Synk– talks about privileged mode containers and why, for the vast majority of us, it’s simply a bad idea as well as some ideas for finding and preventing its use. Privileged mode is part of item number five from our recently published cheatsheet, 10 Kubernetes Security Context settings you should understand, check it out and start securing your Kubernetes application deployments today!
    zeronorth

    Accountability Through Reporting: The Path to True DevSecOps

    Visibility within an application security (AppSec) program is key to accountability. CISOs and executive leaders can’t expect to hold developers and product lines responsible for security when these professionals don’t have the comprehensive insight needed to properly assess risk and security gaps.

    lookout

    Lookout and NTT DOCOMO Partner to Deliver Security from Device to Identity

    Tablets and mobile devices have become an essential part of our daily lives, especially as 5G expands and remote work continues. This means these devices hold some of the most sensitive information that is tied to our digital identity. Today, I’m excited to share that we have expanded our consumer partnership with NTT DOCOMO to include identity monitoring and protection for DOCOMO’s subscribers across Android and iOS devices.

    synopsys

    Security at speed: Justifying your security program transformation using key development motivators

    Security investments require executive buy-in. Learn what key development motivators can help justify your security program updates. As development speeds increase exponentially, organizations often struggle to introduce or maintain security practices capable of keeping pace. Additionally, security teams can find it difficult to get the top-down buy-in and support they need for a security overhaul.

    netskope

    5 Top Tips for Cloud Security from Enterprise CISOs

    The Financial Times hosted an excellent event recently, at which I joined Naina Bhattacharya, CISO for Danone; Manish Chandela, Group CISO for Unipart and Florence Mottay, Global CISO for Ahold Delhaize, to discuss cloud security. The FT’s Dan Thomas moderated and the panellists all shared some excellent and candid insights into cloud threats and security strategies within their organisations.

    netskope

    Cloud Threats Memo: Beware of Leaky Buckets and Cloud Apps

    Another memo, another leaky cloud app compromising the personal information of hundreds of thousands of individuals (and yes, you can easily guess the app that exposed the data so no spoiler alert needed—it was an S3 bucket). The latest organization to join the long list of victims of cloud misconfigurations is Cosmolog Kozmetik, a popular Turkish online retailer that exposed more than 9,500 files, totaling nearly 20 GB of data.

    logsentinel

    XDR: What Next-Gen SIEM Would Have Been

    It’s easy to get lost in product categories in security these days. And XDR (eXtended Detection and Response) is a new addition to the landscape, which makes people wonder – what exactly is that? We’ve previously held that XDR and SIEM are effectively the same thing, although many vendors and Gartner analysts would probably disagree.

    Life Sciences Data Management and Compliance

    Learn how Egnyte for Life Sciences helps leading biotechnology, medical device, and drug development companies innovate faster through seamless compliance and unified document management. This overview video showcases how Egnyte's data privacy, GxP compliance, audit, eTMF, workflow, and Quality documentation products help Life Sciences companies connect globally distributed teams and protect their content.
    WhiteSource

    Cloud Computing Security: A Primer

    Gartner forecasts that worldwide public cloud end-user spending will grow 23% to USD 332.3 billion in 2021 as cloud technologies become mainstream. As cloud computing architectures continue to become more prevalent, “cloud native” has become a popular buzzword. But what exactly does “cloud native” mean and what impact does it have on security? How exactly do you secure all these cloud native applications?

    teleport

    Teleport has been named a Cool Vendor in Gartner's Identity-First Security report

    Today we are happy to announce that Teleport has been included as a Cool Vendor in Gartner Cool Vendors in Identity-First Security report. “We believe Teleport’s inclusion in the Identity-First Security Report by Gartner is confirmation that Teleport solves a huge problem of accessing cloud-native resources that traditional PAM tools did not,” said Ev Kontsevoy, co-founder and CEO of Teleport.

    appknox

    Difference between Agent-based and Network-based Internal Vulnerability Scanning

    Technology evolution is the only constant in our lives these days. Sometimes, an existing approach can go a long way in addressing problems, while other times, a new approach needs to be adopted to get the work done. Let’s talk about vulnerabilities; internal networks and software can be riddled with loopholes, which can expose them to breaches and data leaks, paving the way for hackers to have an easy ride.

    alienvault

    Stories from the SOC - Office 365 account compromise and credential abuse

    Credential abuse and compromised user accounts are serious concerns for any organization. Credential abuse is often used to access other critical assets within an organization, subsidiaries, or another partner corporation. Once an account is compromised, it can be used for data exfiltration, or to further promote the agenda of a threat actor.

    outpost 24

    Zero Trust Architecture (ZTA) within LEXIS

    To ensure Outpost24 stays at the forefront of cybersecurity technology we conduct regular research into new innovations, and LEXIS High Performance Computing (HPC) is one of them. Outpost24 was instrumental in contributing and providing the “Security-By-Design” and “Zero-Trust” principles to creating the secure LEXIS Cloud-HPC-Big Data platform, and in this blog we explore the zero-trust fundamentals for which the LEXIS portal has been designed.

    tripwire

    On the Importance of Protecting U.S. Pipeline Owners and Operators

    In the beginning of May, a U.S. pipeline company suffered a ransomware attack. The company decided to respond by halting operations while it investigated the incident. This delayed tens of millions of gallons of fuel from reaching their destination all along the East Coast. Less than a week later, Bloomberg reported that the company had paid millions of dollars to a ransomware group in order to regain access to their systems. U.S.

    devo

    Trends in Cloud Adoption: Why Cloud Computing is on the Rise

    In this post, I’ll answer one question: Have we reached the tipping point for cloud proliferation? According to the report, the answer is yes. ESG surveyed 500 IT and security professionals working in the security operations center (SOC) chain of command at organizations with more than 1,000 employees in North America and Western Europe in Q1 of this year.

    ekran

    Portrait of Malicious Insiders: Types, Characteristics, and Indicators

    While organizations are spending a good deal of money protecting their data against unauthorized access from the outside, malicious insiders may pose no less harm. According to the 2021 Data Breach Investigation Report [PDF] by Verizon, 36% of all data breaches experienced by large organizations in 2020 were caused by internal actors. For small and midsize businesses, it was 44%.

    Snyk

    Getting started with Snyk for secure Java development

    If you’re a Java developer that wants to develop your applications more securely, you’ve come to the right place. Snyk can help you with that mission. This article will explain how to begin with Snyk for secure Java development so you can be more secure from the get-go. If you’re new to Snyk, it’s important to know that we offer a variety of developer-focused products and tools. Some of these tools, like our CLI and some IDE integration, support multiple products.

    teleport

    How does AWS IAM role, STS and Identity Pool work with each other.

    We talked about IAM in the past 3 posts, identities in IAM, manage users privilege as an IT person and control privilege boundaries. We also talked about how applications use AWS Cognito Identity Pool to get AWS temporary credentials to access AWS resources in early posts of “What I wish I could have learned before starting using AWS Cognito” and “Authentication and authorization with AWS Amplify under the hood”.

    SecurityScorecard

    Security is Everyone's Job: 11 Questions You Should Be Asking

    One of the most common misconceptions about cybersecurity is that the responsibility and ownership sits solely on the shoulders of the CISO and the security team. Common assumptions are anything related to cybersecurity, a security issue or security initiative resides with the security team and the Chief Information Security Officer (CISO). Phishing attacks? That’s a problem for the security department. Vetting vendors and third parties? That belongs to the vendor management team.

    logz.io

    Phishing in New Waters: Exploiting Live Chat to Deliver Malware

    Phishing schemes are always evolving. This past year, email thread hijacking took phishing to new depths of subterfuge as criminals hid in plain sight within existing conversations. But no matter how well cybercriminals have refined their messaging or counterfeited legitimate logos and branding, the one constant has always been their delivery method: email. Until now. Online chat services have become a new target for cybercriminals to introduce documents loaded with malware into organizations.

    Glaring Gap in Open Source Security: Veracode Finds 80 percent of Libraries Used in Software Are Never Updated

    Despite inherent risks of open source code, good software security posture still lacking. 69 percent of fixes are minor and won't break functionality of even the most complex software applications.
    reciprocity

    Risk Management Process For Insurance Companies

    Insurance companies know how to protect their clients’ homes, cars, and businesses— but protecting the personal information of those customers is a bit harder to assure. While the insurance industry focuses on risk-based analyses for its own underwriting programs, firms also need to apply those same risk management processes to securing customer information.

    reciprocity

    What's the System Description of a SOC 2 Report?

    A SOC 2 system description outlines the boundaries of a SOC report. It contains pertinent details regarding the people, processes, and technology that support your product, software, or service. As a reminder, the SOC framework stands for System and Organization Controls. It is a broad architecture that organizations can use to audit the internal controls of vendors and business partners before entering a relationship with those firms, to assess whether those firms have a robust security posture.

    tripwire

    The Evolution of Securing Critical Infrastructure

    Everything evolves. Simply stated, the gradual development of something from a simple to a more complex form is what evolution is all about. When something ceases to evolve, yet still exists, it becomes classified as a living fossil. One example is the Ginkgo Biloba tree. It took millions of years for this evolution to cease. This all happened without any help from humans.

    tripwire

    The Top 5 Vendor-Neutral Cloud Security Certifications of 2021

    Most organizations have already begun their shift to the cloud. In its Cloud Computing Survey 2020, for instance, International Data Group (IDG) found that 81% of respondents had at least one workload or segment of their computing infrastructure in the cloud. That percentage could grow by the end of the year, as IDG found that 32% of total IT budgets will go to cloud computing—up from 30% in 2018.

    zeronorth

    What is Application Security Risk?

    If you have ever considered how hackers and other cyber attackers on the internet use different paths to harm systems and software, you already know a bit about what application risk means. While understanding the essence of risk—and what it can do to the business—is critical, it’s also important to visualize how the notion of security risk is impacted and affected by other areas of threat and vulnerability.

    styra

    Styra blends flexible integration and policy-as-code framework for Capital One

    Capital One Financial Corporation is the nation’s largest direct bank. They have a well-earned reputation as a data and tech pioneer in the financial services industry and have long been progressive in setting a bold agenda around digital and tech transformation. This has meant operating years ahead of most enterprises in moving to the cloud, scaling in-house engineering workforce and adopting agile, microservices, open source and a modern data ecosystem.

    cyphere

    SSL/TLS Protocols: Definition, Differences, Versions & Vulnerabilities

    SSL TLS are two encryption protocols that provide security for communication over the internet. SSL protocol has been around for many years, but both are still widely used today. Why is this? The answer is simple: these protocols work well to encrypt data sent between a client and server computer, which can be very important in protecting sensitive information such as credit card numbers or passwords. But what really sets them apart from each other?

    veracode

    Announcing State of Software Security v11: Open Source Edition

    Today, we published the open source edition of our annual State of Software Security report. Solely focused on the security of open source libraries, the report includes analysis of 13 million scans of more than 86,000 repositories, containing more than 301,000 unique libraries. In last year’s open source edition report, we looked at a snapshot of open source library use and security.

    upguard

    Essential Eight Compliance Guide (Updated for 2021)

    In an effort to significantly improve the cyber resilience of Australian businesses, the Australian federal government is mandating compliance across all eight cybersecurity controls of the Essential Eight framework. This is an ambitious move that may be burdensome to the many entities still struggling to comply with just the top four controls of the Essential Eight.

    nightfall

    PII Compliance Checklist & Best Practices

    Research from Gartner suggests that, by 2023, more than 60% of the world’s population will be covered by some form of personal data protection legislation. From GDPR to CalPRA, privacy regulations are on the rise. These compliance regimes aim to protect a user’s rights to their data — which, in practice, means that businesses need to implement more effective approaches to security.

    netskope

    The SASE Solution to Network and Security's Complicated Relationship Status

    If our friends Security and Networking were on Facebook, they would probably both list their relationship status as “It’s Complicated.” Sometimes everything’s great, but now and then things can get a little weird, unclear, or uncomfortable. At many organizations, there has traditionally been a barrier between the security and networking teams. Each team has its own objectives — and at times, those objectives can be at cross-purposes.

    Security wins by starting out with Static Code Analysis for JavaScript projects

    Writing quality code is something all of us developers strive for, but it's not an easy task. Secure coding conventions have long been an aspiring goal for many developers, as they scour the web for best practices, and guidelines from OWASP and other resources. Some developers may have even tried using static code analysis to find security issues, like the use of linters (ESLint), only to find out that they are brittle and report on many false positives.
    devo

    Is All Data Security Data?

    There’s an old expression: When you’re a hammer, everything looks like a nail. Therefore, is it right for a security company such as Devo to consider all data security data? Let’s examine that concept. Recently I participated in a panel discussion at the GDS Security Insight Summit Europe with my colleague Dean Robertson who heads solution engineering for Devo in EMEA.

    netwrix

    Understanding Insider Threats: Definition and Examples

    Insider threats remain one of the biggest issues plaguing cybersecurity. A study by Ponemon shows that the costs of insider threats leaped 31% in just two years, from $8.76 million in 2018 to $11.45 million in 2020. The same report shows that it takes companies an average of 77 days to contain an insider threat incident. Forrester predicts that insider threats will cause 31% of data breaches by the end of 2021, up from 25% in 2020.

    SecurityScorecard

    What is Access Control? Components and Types

    Digital transformation changes the perimeter. When organizations had all their applications on-premises, the network firewall kept the right users inside the gate and malicious actors outside. However, the move to the cloud changed all that. In today’s hyper-connected ecosystem, understanding the components and types of access control can help you strengthen security.

    upguard

    How to be Compliant with Biden's Cybersecurity Executive Order

    In an ambitious leap towards improving the Nation’s security posture, President Joe Biden has instituted an Executive Order to improve cyber threat information sharing between the U.S Government and the Private Sector. The goal is to align cybersecurity initiatives and minimize future threats to national security by modernizing cybersecurity defenses in the United States.

    reciprocity

    Are U.S. Companies Affected by the GDPR?

    The European Union’s General Data Protection Regulation applies to any organization that operates in the EU or that collects or processes the personal data of EU citizens. So if a business in the United States (or anywhere else in the world, for that matter) does handle such data — yes, the GDPR can apply to you. That said, the exact compliance requirements will vary depending on the size of your company and how you process and store the applicable data.

    reciprocity

    What is Third-Party Risk Management?

    Third-party risk management (TPRM), also known as “vendor risk management” is the process of managing risks introduced to your business by your organization’s vendors, suppliers, contractors, and service providers. Any outside party that plays a significant part in your company’s ecosystem or supply chain is considered a third-party vendor.

    tripwire

    Survey: Nearly Half of Manufacturers Suffered a Digital Attack in the Last Year

    Confidence isn’t new when it comes to cybersecurity. All the way back in 2015, for example, 86% of security professionals working in the energy sector told Tripwire that they were confident they could detect a breach in a week. Just less than half (49%) said it wouldn’t take them longer than a day to spot an attack. It was the same story a year later when Tripwire surveyed infosec professionals in the retail sector.

    forgerock

    Five Lessons from the JBS Attack for Securing the Manufacturing Supply Chain

    The Fourth of July is just around the corner and many Americans are looking to celebrate their holiday with family and friends. “Grillin’ and chillin,’’ as it’s come to be known, is an industry. But what if the prices of meat spiked overnight or, worse still, if there was no meat available on supermarket shelves? And what if consumers learned that this disruption could have been prevented if meat producers had secured their supply chains with modern technology?

    alienvault

    How data poisoning is used to trick fraud detection algorithms on ecommerce sites

    Artificial intelligence (AI) and machine learning (ML) systems have become the norm for using client data to provide recommendations to customers. As more people are working from home and conducting business online, it is imperative that fraud detection software is used to protect user information. But these protective systems also utilize ML to automate the process and understand when a potential attack is taking place.

    nightfall

    Open source data loss prevention for helpdesk ticketing systems

    When your customers want help, ticketing systems provide the first line of communication between your company and your customers. Solving a problem or resolving an issue for your customers often requires collecting a lot of information and context throughout the support interaction. Especially today, these interactions can be captured through a myriad of channels including but not limited to messaging apps, SMS, social media, help centers, forums, bots, video conferencing, and more.

    zeronorth

    What is Application Security Testing and How Does it Affect Software?

    In a nutshell, application security (AppSec) testing is the process of ensuring software is built to be as resistant as possible to outside threats. When applications are secured through effective testing methods, weaknesses and vulnerabilities in the source code and third-party components can be easily identified, managed and actioned before the software is deployed.

    Snyk

    Snyk Container is now an extension in the AWS CloudFormation Registry

    Snyk is excited to announce the general availability of Snyk Container as an officially supported and published extension in the AWS CloudFormation Registry! The CloudFormation Registry lets you manage the extensions that are available for use in your CloudFormation account. Public third-party extensions, like Snyk Container, are made available in the registry for use by all CloudFormation users alongside those published by Amazon and must be activated before use on your account.

    egnyte

    A Beginner's Guide to Risk Mitigation and Management for Security and Compliance Professionals

    Good data governance can go a long way toward reducing business risk. If your content and your data are secure, you’ve eliminated danger to your customers’ information and secured your proprietary information. From a digital perspective, you’re ahead of the game. But data governance shouldn’t be your only concern.

    lookout

    Lookout Announces Expanded Partnership with Google Cloud to Deliver Zero Trust Security from Endpoint to Cloud

    Cloud-based solutions have become essential to how we work and play in the digital era. Many organizations continue their rapid embrace of cloud-based solutions to enable their employees the flexibility to work from anywhere. Cloud spending this year could hit $332 billion, up 23% from 2020, according to a forecast by Gartner, Inc. 1 The cloud has raised our expectations regarding productivity as organizations view the cloud as a true engine of competitive advantage.

    SecurityScorecard

    Top 5 Security Risks of Cloud Computing

    Many businesses are shifting workloads to the cloud in an effort to increase efficiency and streamline workloads. In fact, according to the Flexera 2021 State of the Cloud Report, roughly 90% of enterprises anticipate cloud usage will expand even further as a result of COVID-19. While cloud computing can offer organizations a competitive advantage, it is important not to rush into cloud adoptions without understanding the risks involved as well.

    ioncube24

    Weekly Cyber Security News 18/06/2021

    A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. With various incident response reports showing intruders can be around for a long time before acting, this report of a 8 second exposure really brings home to what someone can get if the opportunity presents its self.

    netwrix

    Cybersecurity Maturity Model Certification (CMMC): Tips for Compliance

    Following a string of 83 data breaches in 2019 alone, the United States Department of Defense (DoD) established the Cybersecurity Maturity Model Certification (CMMC). The CMMC framework is a unified national standard for improving cybersecurity. Companies in the defense industrial base (DIB) must implement CMMC requirements in order to win contracts. Read on to find out how you can achieve compliance.

    alienvault

    Risk-based security now more important than ever for Energy and Utilities!

    This is the third of three blogs in a series to help the energy and utility industries. You can read the first blog on Ransomware and Energy and Utilities and the second blog on Threat Intelligence and Energy and Utilities as well.

    nightfall

    PHI Compliance: What It Is and How To Achieve It

    For organizations that work in or partner with the healthcare industry, HIPAA compliance is of paramount importance. Keeping a patient’s medical records and personal information safe isn’t just a matter of avoiding penalties. It’s also key to building trust with patients and, ultimately, providing great patient care. Here’s what health organizations and their partners need to know about PHI and keeping it secure.

    netacea

    Netacea wins top security title at Global Business Tech Awards 2021

    We are delighted to announce that Netacea has won an award at the 2021 Global Business Tech Awards for our innovative Intent AnalyticsTM cybersecurity solution! After winning the UK Business Tech Award for Best Application of Tech – Security in 2020, we set our sights on the global awards this year. We are over the moon to have been recognized with the title of Best Application of Tech – Security, this time on the international stage!

    SecurityScorecard

    SecurityScorecard Finds USAID Hack Much Larger Than Initially Thought

    SecurityScorecard’s Investigations & Analysis team conducted an investigation into the details surrounding the USAID.gov attack. As has been previously reported, the attack has been potentially attributed to the organization commonly known as Cozy Bear, but our investigation found that the campaign is likely much larger, and began much earlier than has been reported.

    appknox

    Understanding Mobile Application Penetration Testing Methodologies

    Mobile Application Penetration Testing Methodology as a security testing measure, analyses security perimeters within a mobile environment. Derived from the traditional concept of application security methodology, its main focus lies on client-side security and it broadly puts the end-user in control. By conducting penetration testing, companies can gain insights into the source code’s vulnerabilities, bottlenecks, and attack vectors beforehand.

    reciprocity

    What is an Advanced Persistent Threat in Cybersecurity?

    Corporate cybersecurity professionals must be on constant alert to avoid the wide range of cyberattacks that can be thrown at them today: malware, ransomware, trojan horses, social engineering, and spear-phishing attacks, to name just a few. Among the most serious of attacks is the advanced persistent threat (APT). An APT is an attack that uses sophisticated methods to gain access to information systems and sensitive information.

    zeronorth

    SAST vs. DAST: What's the Difference?

    Considering the threats posed by the digital world, organizations today must think about security and the way it affects their software. With business outcomes and revenue on the line, setting up and running an effective application security (AppSec) program is no longer just nice to have—it’s imperative. Practitioners need to identify vulnerabilities in their applications to prioritize risk and mitigate risk, a goal that can only be achieved through comprehensive AppSec testing.

    synopsys

    Reduce open source risk in M&A with software due diligence

    The vast majority of today’s applications are made up of open source components. The 2021 “Open Source Security and Risk Analysis” (OSSRA) report, conducted by the Synopsys Cybersecurity Research Center (CyRC), found that 75% of the 1,500+ codebases analyzed were composed of open source. Understanding what’s in your codebase is essential, and for M&A transactions it’s one of the key drivers for performing software due diligence.

    netskope

    Cloud Threats Memo: Illustrating Big Risks in the Shift to Remote Working

    The exploitation of traditional remote access technologies is reaching new records. That, in a nutshell, is the main finding of Nuspire’s Threat Landscape Report Q1 2021. The report, sourced from 90 billion traffic logs during Q1 2021, looks at a range of events such as malware activity, botnet activity, exploitation activity, and remote access. The remote access section probably best illustrates the risks posed by the sudden shift to remote working.

    Snyk

    Scan for AWS CloudFormation misconfigurations with Snyk IaC

    We’re excited to announce the launch support for AWS CloudFormation in Snyk Infrastructure as Code. In our recent Infrastructure as Code Security Insights report, we found that 36% of survey participants were using AWS CloudFormation (CF) as their primary infrastructure as code tool of choice. Using Snyk Infrastructure as Code, you can now scan your CF YAML or JSON templates against our comprehensive set of AWS security rules.

    forgerock

    Three Steps to Meet Digital Healthcare Challenges in the Post-Pandemic Era

    The combined, specialized efforts of ForgeRock and Accenture in digital identity for healthcare, especially during a global pandemic, have provided a unique perspective. The unexpected digital transformation journey that the healthcare industry has taken from pre-pandemic to current day is staggering. Along with the front-line workers, the healthcare IT and digital experience teams that quickly made digital access and telehealth care available to the masses deserve our thanks.

    inetco

    The Payments Canada SUMMIT: Making the Vision of Modernization a Reality

    A couple of weeks ago The Payments Canada SUMMIT gathered more than 2,000 delegates from financial institutions in Canada and around the world for a virtual one-week conference. INETCO was a sponsor of Canada’s premier payments event. Our team participated in industry discussions, met peers, and learned more about future innovation opportunities in the financial ecosystem. 2021 was a record-breaking year for The Payments Canada SUMMIT.

    netskope

    Bridging the Network-Security Divide with SASE Thinking

    The many business benefits made possible by digital transformation are undoubtedly making waves across industries. Data is the raw material that drives smarter decision-making, and as such, drives value for organizations, but things quickly get challenging when you start to consider how all that data will be used—and who has access to it, when.

    netskope

    The Right Steps to SASE: Extend Zero Trust to Data Protection and Private Access

    The following is an excerpt from Netskope’s recent book Designing a SASE Architecture for Dummies. This is the fifth in a series of seven posts detailing a set of incremental steps for implementing a well-functioning SASE architecture. Now that your organization is smarter about its traffic, able to see what’s going on, and able to enforce policies to secure its data, you can realize the promise of a remote-first workforce.

    SecurityScorecard

    Privacy Laws Comparison: Russia vs. China vs. USA

    The data privacy regimes in Russia, China, and the United States are very different from the regimes elsewhere. The financial lure of selling to, or processing data on, EU residents is strong, which has led other countries to adopt the General Data Protection Regulation (GDPR) or something like it. Russia, China, and the United States are large enough for other forces to dominate, including the desire to have their citizens’ data stored locally, as we’ll see.

    synopsys

    How To Cyber Security: Put the Sec in DevOps with Intelligent Orchestration

    DevSecOps is a team effort. Learn how to build security into DevOps to deliver secure, high-quality software faster using SAST and SCA software solutions. Modern software development is more of everything: more code, in more languages, on more platforms, with more deployment options. DevOps demands automation to maximize velocity and continuous improvement throughout process feedback. All this more also means more security risk.

    alienvault

    How Zero Trust architecture improves the organization's network security

    In the cybersecurity field, Zero Trust is becoming a widely used model. Data breaches taught organizations to stay cautious regarding security, especially when it comes to information protection - and a Zero Trust model may be the best option. Nobody, including clients inside the firewall, should be trusted, per Zero Trust. Internal threats are a huge concern. And for many attackers, penetrating the barrier is a simple operation, thanks to easy access to leaked credentials.

    reciprocity

    Why Is Cybersecurity Important?

    It’s the stuff of IT managers’ nightmares and it is coming to a server near you: ransomware attacks, phishing schemes, privacy breaches, and other yet-to-be imagined cyber threats aiming to pilfer the sensitive data stored on your IT systems. Cybercriminals target large companies like Microsoft, Equifax, Expedia, and Barnes & Noble just to mention a few big victims from 2020.

    tripwire

    What's New in v8 of the CIS Controls

    Back in 2018, the State of Security spent a lot of time going over v7 of the Center for Internet Security’s Critical Security Controls (CIS Controls). We noted at the time how the Center for Internet Security shuffled the order of requirements for many of the existing controls in that version. It also cleaned up the language of the CIS Controls, simplified some working, removed duplicate requirements, and created an abstract for each of the security measures.

    netacea

    Cryptocurrency is a major target for account takeover

    Cryptocurrency and blockchain are two of the hottest trending topics in the financial and tech worlds, with interest in Bitcoin, Ethereum, XRP and even Dogecoin exploding in recent years. This growing interest in cryptocurrencies has made them a target for fraudsters. But it’s not just the popularity of crypto trading that has criminals chomping at the bit. The nature of blockchain currencies makes them highly susceptible to fraudulent activity.

    Snyk

    Advancing SBOM standards: Snyk and SPDX

    Many people will have heard of the SPDX project through the work on the SPDX License List. This list of canonical identifiers for various software licenses is used in a huge range of developer-focused software, from Snyk to GitHub. But the SPDX project, which is part of the Linux Foundation, has a much broader focus on providing an open standard for communicating software bill of material information.

    Snyk

    You can't compare SAST tools using only lists, test suites, and benchmarks

    There are a lot of challenges one might face when trying to identify the best SAST tool for your team. But how do you measure something that is meant to find unknowns? How do you know if the tool is appropriate for your needs? How do you compare different tools? It’s no wonder that we often get asked, “Does Snyk Code have coverage for the OWASP Top 10?” followed by “How do you suggest we evaluate and compare different SAST tools?”

    Reduce open source risk in M&A with software due diligence | Synopsys

    Understanding what’s in your codebase is essential, and for M&A transactions it’s one of the key drivers for performing software due diligence. Identifying open source risks, security flaws, and code quality issues ensures there are no surprises for acquirers, and earlier detection protects the value of a deal.
    zeronorth

    8 Tough Questions to Ask When Securing Your Software Supply Chain

    Software supply chain breaches are headline news right now, and they’ve even been given an honorable or, more accurately, a dishonorable mention in the White House’s recent Executive Order on cybersecurity. But the software supply chain is not new. In fact, it’s been around since the mid-’80s, and so has the risk. The software supply chain contains all the software components needed to create and deliver a fully functional software product.

    netskope

    Netskope Named a 2021 Gartner Peer Insights Customers' Choice for Secure Web Gateway

    At Netskope, one of our core values as a company is that customers are always our number one priority. We know that technology projects are rarely easy undertakings and it’s our job to be there for our customers and for them to know we have their backs. With that in mind, we are excited to announce that Netskope has been recognized as a Customers’ Choice in the June 2021 Gartner Peer Insights ‘Voice of the Customer’: Secure Web Gateway.

    tripwire

    What Is a Security Operations Center (SOC)?

    Data breaches are costing organizations millions of dollars on average. In its 2020 Cost of a Data Breach Report, IBM found that a data breach cost the average organization $3.86 million. This price tag was even greater for organizations located in the United States and operating in the healthcare industry at $8.64 million and $7.13 million, respectively. What’s behind this price tag, you ask?

    inetco

    Why False Declines Cost You More Than Fraud and What to Do About It

    Do you remember a time when you were amped up to buy that new pair of shoes, or any special item online – only to have your credit card or other payment information (which you know is real), declined? All of that time spent browsing, selecting, getting off of your couch to find your credit card, entering payment information wasted? You are not alone!

    teleport

    AWS IAM in a layman's terms

    We alluded in one of our previous posts that the development team will own a lot of responsibility defining application related resource access control, simply because the dev team owns the infrastructure as code (IaC) responsibility themselves. No matter how security-savvy and security-educated a development team is, the central security team still needs some control, some kind of “trust but verify”.

    SecurityScorecard

    Forrester Total Economic Impact of SecurityScorecard Study: Automate - Don't Excel

    One of the key reasons SecurityScorecard commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) Study was to help the market move on from using spreadsheets as a Vendor Risk Management (VRM) tool. The primary reason for IT teams to look at SecurityScorecard or any other VRM automation platform is simple. IT (Information Technology) will help IT teams get better leverage on their two rarest commodities in the security world, time and talent.

    logz.io

    2021 Data Breach Outlook - "Under-attacked" Industries Feel the Heat

    Industries most impacted in 2019 continued to be hard hit in both 2020 and so far in 2021, including healthcare, education and financial services. However, the greatest percentage increases occurred in industries that had been generally spared in 2019. The overall implication is that data attacks became broader and deeper during the pandemic, a trend that continues during the recovery.

    styra

    Getting Open Policy Agent Up and Running

    Today, more organizations than ever use Open Policy Agent (OPA) as the de facto standard for policy enforcement across the cloud native stack. A graduated project from the Cloud Native Computing Foundation (CNCF), OPA has dozens of use cases — from Kubernetes guardrails, to microservices authorization, to infrastructure-as-a-service controls — that are leveraged by millions of users.

    WhiteSource

    Research Shows Over 100,000 Libraries Affected By Maven Vulnerability CVE-2021-26291

    By Jonathan Leitschuh; Daniel Elkabes, Senior Security Researcher at WhiteSource; Ofir Keinan, Software Developer at WhiteSource The latest Maven release 3.8.1 contains a fix to security vulnerability CVE-2021-26291. Detected and reported by security researcher Jonathan Leitschuh, the vulnerability affects over 100,000 libraries in Maven Central, according to the WhiteSource security research and knowledge teams.

    alienvault

    Palo Alto Networks teams with AT&T to deliver managed SASE

    Remote workforces accessing applications and data that are located anywhere is the “new normal.” Across the globe, organizations of all sizes are struggling to modernize their infrastructures to accommodate this new reality while accelerating their digital transformation initiatives.

    synopsys

    Ransomware prevention begins with securing your applications

    Ransomware prevention measures such as securing your applications can help you avoid becoming the next target. Ransomware isn’t a new problem—not even close. It’s been around for more than 30 years. But like every element of technology, it has evolved. Instead of being an occasional expensive nuisance, it’s now a plague with existential implications for critical infrastructure—energy, transportation, food supply, water and sewer services, healthcare, and more.

    netskope

    Who Do You Trust? OAuth Client Application Trends

    Federated identity systems, such as Google Identity, bring security and convenience in the form of SSO for Internet or cloud applications. It is common to be prompted for authentication in order to grant various levels of access or permissions for applications ranging from Google Drive, Google Cloud SDK, Google Chrome plugins, Slack, Adobe, Dropbox, or Atlassian to numerous third-party apps.

    Snyk

    Snyk provides native integration for Atlassian Bitbucket Cloud security

    We’re excited to share that we have enhanced our partnership with Atlassian. In support of this partnership, today we are releasing full availability of the new integration, which natively embeds Snyk into Bitbucket Cloud for security. The Snyk security integration is free and easy to set up with just a few clicks inside the Bitbucket Cloud product. For the first time, developers can consume information that was previously only available inside Snyk now within Bitbucket Cloud.

    netskope

    Cloud Threats Memo: Takeaways From the Q1 2021 Phishing Activity Trend Report

    The Anti-Phishing Working Group (APWG) has just released its Phishing Activity Trend Report for Q1 2021. The first findings are easily predictable; the dispersion of the workforce is pushing phishing attacks to new records: just in January 2021, the APWG detected 245,771 unique phishing sites, the highest number reported so far.

    cyphere

    Are you GDPR 'data controller' or 'data processor'? Why is it important?

    The responsibility for compliance with GDPR privacy laws, and the consequences of non-compliance can vary greatly from one organization to another. Often it is not clear who is responsible for data protection – whether or not they are a “data controller” or “data processor” – but here are some guidelines in order to help you determine which category your company falls into so as to best take necessary precautions against breaches or other potential illegalities.

    CloudCasa

    Get Kubernetes Backup - CloudCasa - in 1-Click from DigitalOcean Marketplace

    Are you a DigitalOcean vendor or user and developing or deploying a Kubernetes application? You may want to preserve your cluster configuration, backup your persistent volumes to protect them from ransomware, accidental deletion, and long-term retention policies. CloudCasa is the only data protection and disaster recovery solution that has been tested and certified as a 1-Click appliction with DigitalOcean Kubernetes and available in their marketplace.

    alienvault

    Malware hosting domain Cyberium fanning out Mirai variants

    AT&T Alien Labs has observed the Mirai variant botnet, known as Moobot, scanning for known but uncommon vulnerabilities in Tenda routers, resulting in a considerable peak in our internal telemetry. The research associated with this peak resulted in the discovery of a malware hosting domain, providing several different Mirai variants, like Moobot and Satori.

    tripwire

    A Look at a Zero Trust Strategy for the Remote Workforce

    If you are new to the security world, it is fair to ask yourself, “Isn’t access to data and systems always conditional? Isn’t it always granted to someone who has access to the credentials (ID and password)?” True enough, but in totality, the approach to managing access encompasses a broader spectrum of privacy policies. These policies include a mix of different strategies that can be applied based on an organization’s security vulnerabilities.

    synopsys

    Data privacy laws drive urgency to create a data security strategy

    With the introduction of more data privacy laws, companies can use a data security strategy and framework to help them achieve better compliance. This is the second post in a data protection blog series that addresses how organizations can better protect their sensitive data. This blog post addresses data privacy laws, frameworks, and how organizations can create their own data security strategies and frameworks to achieve compliance with today’s data privacy laws and standards.

    nightfall

    Is Slack Secure? Vulnerabilities and Solutions

    Slack has become one of the most integral platforms for businesses over the last decade, with more than 12 million users currently active. Despite its popularity, however, there are some Slack security concerns that linger from the platform’s 2015 security breach. Here’s what you need to know about Slack security and how to protect your sensitive information on the platform.

    Snyk

    Easily map Snyk vulnerabilities to Cortex services

    Snyk is a developer-first, cloud native security platform that scans for vulnerabilities across code, dependencies, containers, and infrastructure as code. Snyk does a great job of surfacing vulnerabilities in your codebase, but it can often be challenging to map these issues back to actual services and their owners. Fortunately, Snyk’s robust API can be used to tune Snyk to integrate into solutions designed to help engineering teams understand and improve their service-oriented architecture.

    egnyte

    5 Risk Mitigation Strategies That Can Save Your Business Lots of Money

    Businesses sit on massive, ever-growing piles of data. According to Dave Reinsel, senior vice president, IDC's Global DataSphere, 64.2 zettabytes (ZB) of data was created or replicated in 2020. And the amount of digital data created over the next five years will be greater than twice the amount of data created since the advent of digital storage. But data isn’t just growing, it is spreading to more applications, more users, and more devices than ever.

    devo

    New Devo report shows organizations how to embrace the cloud for better security outcomes

    Devo recently published a new research report Beyond Cloud Adoption: How to Embrace the Cloud for Security and Business Benefits, based on a survey conducted by Enterprise Strategy Group (ESG). ESG surveyed 500 IT and security professionals working in the security operations center (SOC) chain of command at organizations with more than 1,000 employees in North America and Western Europe. The survey took place in the first quarter of 2021. This is the first in a series of posts about the report.

    Cyber Kill Chain: What It Is, How It Works

    What is the cyber kill chain? What is an example of the Cyber Kill Chain? What are the 7 steps of the cyber kill chain? Is the Cyber Kill Chain outdated? Cyber Kill Chain vs Mitre Att&ck Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.
    tripwire

    Ransomware is the biggest threat, says GCHQ cybersecurity chief

    The head of the UK’s National Cyber Security Centre has warned that ransomware has become the biggest threat to British people and businesses. In a speech being given today by Lindy Cameron, chief executive of the NCSC, to the RUSI think tank, she highlights the need for ransomware problem to be taken seriously, and warns of the “cumulative effect” if society fails to properly deal with the rising threat.

    SecurityScorecard

    Due Care vs. Due Diligence: What's the Difference?

    Cybersecurity is more than “just” technology these days. With legislative bodies increasingly writing more laws, technology and legal terminologies have become more intertwined than ever before. As organizations build cyber risk strategies, they need to understand risk mitigation’s underlying goal. This is why understanding the difference between due care and due diligence is important to how you set your risk mitigation strategies.

    reciprocity

    What is Penetration Testing? Pen Tests Defined

    Penetration testing, also known as “pen testing,” is an intentional, simulated cyberattack against your IT systems to find vulnerabilities and test the efficacy of cybersecurity controls. For example, penetration testers can use this tactic to improve web application security mechanisms such as firewalls. Pen testing might involve an attempt to breach access controls to gain access to a private network.

    bulletproof

    Penetration Testing: A How-to Guide for Enterprises

    Penetration testing is the cornerstone of any cyber security strategy, yet enterprises often don’t get an optimal outcome from their pen test engagements. In this blog I’ll be looking at the three main reasons behind this, and also suggesting an alternative way of working that could vastly improve security outcomes whilst also increasing business value.

    Proprietary vs Open Source: Which Software is Better for Your Company Security? (Webinar Cuts)

    Proprietary and open source security products each have their own benefits. Proprietary products often have a smaller learning curve which can lead to more efficient learning and operational practices. Open source products can be deployed by anyone without the need for licenses and/or commitments which is ideal for organizations that rely on a wide range of third parties to provide services and products.
    nightfall

    Is Atlassian Cloud HIPAA Compliant?

    In 2021, digital transformation has accelerated. At the tail end of the COVID pandemic, with companies remaining remote, the demand for cloud services in the enterprise is the highest It’s ever been. Healthcare organizations, which more directly encountered the acute challenges posed by the pandemic, were among the first to be shaped by the current wave of digital transformation.

    nightfall

    Nightfall's DLP API Adds Data Discovery and Classification to Your Applications

    As a cloud-native data loss prevention solution, Nightfall DLP can natively integrate with some of the most popular SaaS applications in order to protect against the proliferation of sensitive data in these environments. With our native integrations, Nightfall helps keep client data safe on apps including Slack, GitHub, Google Drive, Confluence, and Jira. But did you know that Nightfall also exists as a standalone DLP API?

    wandera

    What is the new trend of hoteling for hybrid work?

    ‘Hoteling’ is the latest concept for business leaders developing hybrid work strategies. Numerous research reports have emerged highlighting that employees don’t want to return to the office full time. Buffer found that 94% of respondents who started working remotely during the pandemic would like to continue to work remotely some of the time for the rest of their career, and this figure jumps to 99% for those who worked remotely prior.

    redscan

    Redscan Highly Commended at SC Awards 2021

    In a strong shortlist of seven finalists, Redscan took home a High Commendation in the Best Managed Security Service category for the second consecutive year. We were also a finalist in the Best Customer Service and Best SME Solution categories. The SC Awards recognises the people, products and services that exemplify the best solutions for customers in the security industry.

    alienvault

    Threat Intelligence and Energy and Utilities

    It is increasingly common to hear about cyber threats to energy and utility industries. These are malicious acts by adversaries that target our data, intellectual property, or other digital assets. All too often it seems as though energy and utility companies are put in a defensive position to battle it out with these cyber intruders. How can the industry switch to a more offensive position when it comes to understanding these threats?

    lookout

    Not All CASBs Are Created Equal. How Do You Choose?

    Software as a service (SaaS) apps have reshaped the way we stay productive. By having everything easily accessible in the cloud, we are able to get work done from anywhere and on any device. But, as we know, this flexibility has also introduced security challenges, as your data is also easier to reach for malicious actors. This is why the purchase of a cloud access security broker (CASB) is never that controversial. Most organizations understand that cloud apps require additional protection.

    reciprocity

    What Is the Principle of Least Privilege?

    As you go about the work of managing your IT environment, it’s likely that you already apply the Principle of Least Privilege (POLP, also known as “least privilege access”) — probably without giving this important concept a second thought. After all, not every employee in your company has admin rights on your website, or access to your financial accounts.

    tripwire

    Key Considerations for the Department of Energy on Defending the Bulk Power Grid

    On January 20, President Joseph Biden issued Executive Order (E.O.) 13990 to help protect U.S. bulk power organizations. This Order enacted a 90-day suspension of E.O. 13920 which was set by the previous administration. The new executive order empowered the Secretary of Energy (“Secretary”) to publish new criteria around pre-qualifying vendors of electric equipment, as well as to devise rules for helping U.S. entities replace electric devices at risk of sabotage.

    upguard

    Top 10 Australian Cybersecurity Frameworks in 2021

    If you're an Australian business and confused about which cybersecurity frameworks you should be complying with, you're not alone. Unlike the United States, Australia currently doesn't have clear mandatory minimum cybersecurity standards for businesses. This is likely to change in the near future. The Australian government is being pressured to follow the United State's lead in lifting the Nation's security posture.

    WhiteSource

    10 Supply Chain Security Tips That Won't Slow Development Down

    As supply chain attacks continue to dominate headlines, software development teams are beginning to realize that package management can’t be taken lightly — the threats hidden under the hood are real. In this installment of The Source, we want to talk about the practices and tools that developers need to adopt in order to protect against supply chain attacks.

    synopsys

    How to achieve MISRA and AUTOSAR coding compliance

    Get practical steps for MISRA and AUTOSAR compliance to improve code quality, safety, and security in automotive software. Recent advancements in the automotive industry include the development of autonomous driving systems, connectivity units, and digital cockpits and infotainment systems that improve the user experience.

    egnyte

    3 Ways Egnyte is Helping Construction and Engineering companies Tap into the Power of the Public Cloud (and How)

    90% of companies are on the cloud (Galov). That includes industries historically slow to adopt new technology, like Architecture, Engineering and Construction (AEC). However, recent economic and workplace disruptions have pushed AEC firms more aggressively into the public cloud waters - looking for cost effective ways to access compute power, more efficiently process data, provide access to files and applications, and tap into advanced analytics to draw insights from and manage data.

    netskope

    The Right Steps to SASE: Introduce Zero Trust Principles to Web, Cloud, and Activity Access

    The following is an excerpt from Netskope’s recent book Designing a SASE Architecture for Dummies. This is the fourth in a series of seven posts detailing a set of incremental steps for implementing a well-functioning SASE architecture. This is when you’ll begin to put NG-SWG to work as you lay the foundation of your SASE. Fortunately, the capabilities needed to set things right are built into NG-SWG.

    Snyk

    Understanding the software supply chain security requirements in the cybersecurity Executive Order

    President Biden’s cybersecurity executive order from last month should cause little surprise for anyone following news headlines over the past year. The order is the U.S. Federal Government’s important response to a long list of incidents, starting with the SolarWinds attack and ending with a recent ransomware attack against Colonial Pipeline —- the largest known attack against a US energy firm.

    Spring Launch 2021: See Risk | Solve Problems | Report Results

    Security leaders are facing a trifecta of challenges: more sophisticated and frequent cyber attacks, expanding regulations and government mandates, and organizational leaders seeking risk management assurances. CISO’s SecOps and VRM teams need complete visibility to threats across their entire attack surface, with insights to take immediate action, and timely reporting for key stakeholders. SecurityScorecard empowers you to see and understand cybersecurity risk in your organization and across your ecosystem with 360° visibility and seamless workflow integration with your security stack.
    SecurityScorecard

    What to Know About SecurityScorecard's Integrate360° Marketplace

    The old saying “it takes a village” applies to many things in life, including securing your organization. Security is a team sport that requires a variety of solutions and providers — such as a firewall, endpoint protection, security information and event management (SIEM), threat intelligence provider, IT service management (ITSM), governance, risk, and compliance solution (GRC), and cloud access security broker (CASB) — to name a few.

    cyberint

    Widespread Website Outages - Fastly CDN

    Commencing just before 1000hrs UTC on June 8, 2021, widespread reports of high-profile websites being unavailable began to surface with visitors to these sites receiving ominous looking error messages (Figure 1). Figure 1 - Example outage message 'gov.uk' Initially, many of these error messages returned a HTTP error '503', advising the user that the service is unavailable, and these originated from a 'Varnish cache server' HTTP accelerator that was attempting to serve the intended content.

    appknox

    Top 10 Biggest Data Breaches in the 21st Century

    A data breach is defined as the unauthorized access to sensitive information about a person – whether it's their personal, financial information, passwords, credit card numbers, social security number, and other sensitive information. It is one of the most costly and damaging issues that can plague any person and company. Unfortunately, it has become a far too common occurrence these days as hackers constantly find ways to break even the most complicated security measures.

    alienvault

    Are fraudsters using automation to execute mass cyber-attacks?

    As our digital world turns toward advances in automated technology to increase efficiency and productivity, cybercriminals are also learning how to execute mass automated cyber-attacks. According to the 2021 AT&T Cybersecurity Insights Report, most people are concerned about the security of various applications and 52% believe that these threats challenge the integrity of networks.

    reciprocity

    What is Zero Trust Architecture?

    Zero Trust Architecture (ZTA) means exactly that: compliance officers and IT security teams are trained to not trust any network activity, anywhere, at any given time — not even on the inside of their own computer network. Don’t panic; ZTA is not as difficult to work with as it sounds. It’s simply a different way of approaching cybersecurity. So let’s take a look at how it works.

    styra

    K8s Admission Control vs RBAC

    Today, if you’re running Kubernetes, you know that security is not “built-in.” To secure your clusters, you have to configure, add or build in additional controls. Some are part of Kubernetes, like role-based access control (RBAC), but other best practices include specifying trusted repositories for known-good containers and then layering in runtime scanning tools as well.

    calligo

    Data Warehouse vs Data Lake - Which Is Best?

    While both data warehouses and lakes are big data storage solutions, they are useful in distinctly different situations. Data warehouses store structured data that can be accessed and interpreted by anyone with permission to do so, whereas a data lake is an unstructured storage space for large quantities of raw data. Data lakes store big data in its raw form, with minimal structure and few controls over what data is included or excluded from the storage space.

    netacea

    What is the real cost of carding attacks?

    Since many brick-and-mortar stores closed during the Covid-19 pandemic, online shopping has grown massively through 2020 and into 2021. Fraudsters have seized this opportunity to strike, with data breaches in 2020 exposing over 155.8 million records, which could be used fraudulently, in the US alone. Carding is one of the most common and costly types of online fraud.

    Snyk

    Secure development in Visual Studio with Snyk Open Source

    We’re pleased to announce our new extension for Visual Studio, making it easier for developers to stay both secure and compliant as they code within their favorite IDE. The extension supports Visual Studio 2015, 2017, and 2019. Snyk’s new free extension for Visual Studio enables developers to easily find and fix both known vulnerabilities and license issues in their open source dependencies, helping them address security early on and ship secure code faster.

    Snyk

    Recapping DockerCon 2021 with Snyk: Red Ventures, Docker container security, and more

    DockerCon 2021 brought containerization experts together to discuss all things Docker, from building containerized applications and running container images to improving container security. In this post, we’ll recap a live panel discussing how container security fits into the new cloud native era, how Red Ventures scaled container security scanning with Snyk, and ways to make vulnerability remediation easier.

    veriato

    What we can learn from the most alarming 2021 breaches so far

    The escalation in cybersecurity breaches as seen in 2020 has continued well into 2021. According to Verizon’s 2021 DBIR , so far they have looked into 29,207 incidents worldwide. These incidents boiled down to 5,258 confirmed data breaches. An analysis of these breaches shows: Many of these breaches were financially motivated, targeting sensitive data that can be easily monetized and lucratively too. Human negligence, consistent with previous years, was the biggest threat to security.

    egnyte

    Announcing: Egnyte for Life Sciences Quality

    The sheer number of parties involved in a clinical trial results in increased complexity. The ability to tame this complexity is what separates high-growth biotechs from the rest. In order to keep up with the pace of innovation organizations must improve efficiencies while adhering to regulatory requirements, all in a drive to maintain consistent data quality.

    netskope

    Key Considerations for the Future of Work

    In summer 2020, as it became abundantly clear that remote working in response to the COVID-19 pandemic was here to stay, Netskope surveyed more than 400 end-users in the US from across many industries, including telecommunications, IT, government healthcare, finance, nonprofit, and education, about their thoughts related to remote working.

    tripwire

    5 Tips and Tricks for Cloud Native Security

    Cloud-native applications that are based on new types of infrastructure such as containers and serverless platforms are being rapidly adopted by organizations worldwide. While cloud-native applications deliver compelling benefits such as elastic scalability, unmatched resilience and rapid development velocity, they also raise challenges.

    SecurityScorecard

    57 Cybersecurity Terms You Should Know in 2021

    Cybersecurity can seem intimidating, especially when you’re not already familiar with security and IT. There are so many threats and a lot of terms you need to know in order to understand the countermeasures that can help keep your data safe from attackers. What is an attack surface, after all? And what’s a rootkit? Non-technical employees and decision-makers might find their eyes glazing over when cybersecurity terms start getting thrown around.

    redscan

    CYBERTECH100: Redscan named in global list of cyber security innovators for the financial sector

    The CYBERTECH100 is a list of the world’s most innovative companies that every financial institution ‘needs to know about’ to help combat cyber threats in 2021. Redscan was selected in recognition of ThreatDetect™, our Managed Detection and Response service, from over 1,000 companies who submitted their products and services for consideration.

    logz.io

    Singapore's PDPA - Are You Prepared for Your Next Data Breach?

    Businesses in Singapore face mounting challenges to protect customer data as a result of the newly enacted Personal Data Protection (Amendment) Bill (PDPA). With higher penalties expected to be levied from February 2022, it’s imperative that enterprises, particularly those collecting customer data, have a solid information security framework and incident response plan in place.

    synopsys

    Code Dx brings game-changing capabilities to Synopsys

    Code Dx adds software vulnerability correlation, prioritization, and consolidated risk reporting. Today, Synopsys announced the acquisition of Code Dx, the provider of an award-winning application security risk management solution that automates and accelerates the discovery, prioritization, and remediation of software vulnerabilities.

    Snyk

    Automate vulnerability scanning in AWS CodePipeline with Snyk

    Empowering developers to build securely has always been Snyk’s mission. We enable you to find and fix security vulnerabilities in your code and open source dependencies, as well as enable development teams to easily integrate security testing as part of their automated delivery pipelines. Snyk also provides native integrations with leading CI/CD platforms such as Jenkins, TeamCity, and CircleCI. To this end, we are happy to announce Snyk’s latest integration with AWS CodePipeline.

    A Team-Centric View of Security with Snyk and CloudBees

    How does a team-centric collaboration focus change how a team maintains the security of the code? In this fireside chat, Patrick Debois, Snyk Labs Researcher, joins Anders Wallgren, Vice President of Technology Strategy at CloudBees. to explore this theme. They discuss what's new and changing with application security and what have we learned from DevOps that organizations can and should apply to DevSecOps.
    nightfall

    What Is DevSecOps and How To Implement It

    DevSecOps follows the same trend as Agile and DevOps: how can developers create software that’s better, faster, and less expensive? The DevSecOps motto — “software, safer, sooner” adds the missing piece to the latest approach to quicker product development. Security, previously an afterthought in the product development lifecycle, is now becoming an integral part of the process.

    nightfall

    Cloud Security Architecture: 5 Best Practices

    Cloud programs like Slack and Google Drive allow businesses to work collaboratively and efficiently, often at a low cost. However, these cloud platforms open a business up to new levels of risk: sharing information via cloud programs can put customer data at risk. Cloud security architecture provides a way to recognize and remedy vulnerabilities that result from using cloud service providers (CSPs).

    idcentral

    Digital Identity Update: Digital Identity Wallet to build a secure and seamless onboarding system for EU

    From ordering groceries to paying taxes everything has taken a shift to digital platforms. If you are still not going digital, you are putting your survival at stake. With the spur in digitization, digital identification has become ‘fundamental’ to the everyday operation of online services, but a universally recognized and secure solution has been lacking ever since.

    logsentinel

    Press Release: LogSentinel is among The CyberTech100 pioneering companies helping financial institutions

    8th June 2021 Naarden, Netherlands – LogSentinel, the innovative next-gen SIEM provider, announced that it was included in the annual list of the world’s most innovative providers of cybersecurity solutions for the financial sector – CyberTech100. “We are thrilled that LogSentinel SIEM, our flagship product, was recognized by FinTech Global as one of the top 100 information security products for the financial industry.

    netskope

    Operationalizing IP Allow Lists for Cloud Environments

    If applying IP allow lists to the cloud excites you as much Another One Bites the Dust on volume 11, read on. In this blog, I’ll discuss some considerations regarding operationalizing, automating, and increasing the efficacy of IP allow lists in your cloud infrastructure. Although this discussion will be in the context of cloud infrastructure providers such as AWS, GCP, and Azure, it should also be applicable to other cloud infrastructure and application environments.

    bearer

    The European Commission's new SCCs for data transfers

    The GDPR recently marked its three-year anniversary, but one aspect of compliance for many companies is much older. Standard contractual clauses (SCCs), the mechanisms that most international organizations used to legally transfer data between the European Economic Area (EEA) and third party countries—like the US—are over a decade old. For organizations moving data in and out of the EEA, the last few years have been complicated.

    I can use VS Code to hack into your development environment

    We have been witnessing an ever-growing amount of supply chain security incidents in the wild. And now, those incidents are starting to extend to the place where developers spend most of their time: their integrated development environment, and specifically the Visual Studio Code IDE. Recently, Snyk has discovered and disclosed vulnerabilities that pose a real and imminent threat to developers who use these extensions. The potential compromise is so significantly severe that a remote code execution on a developer’s machine is possible by simply tricking the developer to click a link.
    wandera

    Wandera and SYNNEX team to bring secure remote access to organizations across North America

    SAN FRANCISCO, June 8, 2021 – Wandera, a leading provider of zero-trust cloud security solutions for remote workers today announced a distribution agreement with SYNNEX Corporation (NYSE: SNX), a leading provider of distribution, systems design, and integration services for the technology industry.

    nightfall

    Evaluating content inspection engines for data classification applications

    Many organizations recognize the emergent need to discover, classify, and protect their sensitive information stored in cloud applications (SaaS) and infrastructure (IaaS) via a dedicated cloud content inspection process. However, cloud-native detection engines are a relatively new technology, and many corporate Information Security teams or Product Security developers are, understandably, not yet familiar with how to effectively evaluate cloud content detection.

    netskope

    Cloud Threats Memo: RDP Misconfigurations and Initial Access Brokers

    A recent study by Sophos has added more fuel to the RDP fire, confirming that the exploitation of this service, when not adequately protected, remains one of the preferred techniques to compromise an organization. Not only has the exposure of RDP servers, driven by the pandemic, led to an exponential increase of brute-force attacks against this service, but it has also encouraged a flourishing market of initial access brokers.

    SecurityScorecard

    JBS Ransomware Attack Started in March and Much Larger in Scope than Previously Identified

    SecurityScorecard also found that 1 in 5 of the world’s food processing, production, and distribution companies rated have a known vulnerability in their exposed Internet assets

    ThreatQuotient

    See how to Amplify your SIEM by Integrating with the ThreatQ Platform

    SIEMs have been around for decades, designed to replace manual log correlation to identify suspicious network activity by normalizing alerts across multiple technology vendors. SIEMs correlate massive amounts of data from the sensor grid (your internal security solutions, mission-critical applications and IT infrastructure). As organizations are looking at ways to mine through SIEM data to find threats and breaches, they are bringing in threat intelligence feeds to help.

    forgerock

    Why We Need to Eliminate Usernames and Passwords for Good

    Our third annual ForgeRock Consumer Identity Breach Report has just been released, providing insights into the global threat landscape. The COVID-19 pandemic caused a digital migration like we’ve never seen before. People spent twice as much time online and cybercriminals wasted no time in taking advantage of this new reality.

    cyberint

    Why Digital Risk Protection on Social Media is a Must For Online Retailers

    Updated as of June 7th 2021 It's an excellent time to be an online retailer. In 2021, over 230 million Americans will be shopping digitally, positioning the United States as one of the leading e-commerce markets. Social platforms are highly influential with millennials, teens, and Gen Z consumers; 50 percent of college students have purchased on Instagram, and 48% of U.S. internet users aged 18 to 34 years have purchased through social media this year.

    alienvault

    7 Challenges in modern Cybersecurity and how to fix them

    Cybersecurity is a leading concern for any business today. While this trend has made IT security a secure and potentially lucrative field, modern cybersecurity professionals also face growing challenges. If you hope to keep your business safe amid rising threats, you’ll have to overcome these obstacles. In that spirit, here are seven of the top challenges in modern cybersecurity and how you can solve them.