Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2023

NIS2 Directive and cyber risk management

The NIS2 Directive, published in December 2022, sets out a series of measures for improving cyber risk management throughout the European Union. All EU member states must apply the Directive as part of national law by October 2024. By the same date, all applicable organizations must comply with the measures set out in NIS2.

The Five Pillars of Cloud Security

As more employees move to remote work, more of today’s business environment is shifting towards the cloud. Indeed, approximately 90% of companies use at least one cloud-based service. While it brings great benefits, the cloud also brings challenges, including properly securing cloud-based assets. Cybercriminals are well-versed in corporate cloud usage and are successfully exploiting that knowledge. In the past year and a half, nearly 80% of companies suffered a cloud-based data breach.
Featured Post

Why Fuzzing isn't enough to Test your APIs

In today's fast-paced development environment, a comprehensive API security testing strategy is no longer a luxury, but a necessity. Testing your APIs for security gaps ensures that your APIs functions are reliable, secure, and perform as expected under different circumstances. It helps to identify issues such as incorrect data formats, missing or inaccurate data, and faults in authentication or authorisation.

Rezilion Uncovers High-Risk Vulnerabilities Missing from CISA KEV Catalog, Challenging Current Patching Prioritization Standards

Rezilion announces new report, "CVSS, EPSS, KEV: The New Acronyms - And The Intelligence - You Need For Effective Vulnerability Management," detailing the critical importance of the Exploitability Probability Prediction Score (EPSS) for enhancing patch prioritization and effective vulnerability management.

Protegrity and Exasol extend partnership, enabling customers to take advantage of today's rapidly evolving API economy

Integration with Protegrity's Application Protector REST API enhances Exasol's data protection capabilities and enables support for multi-cloud, on-premise and hybrid environments, providing customers with the most advanced and comprehensive data protection capabilities.

Forward Networks Achieves SOC 2 Type 1 Compliance, Demonstrating Commitment to Transparency and Data Security

Forward Networks announces it has successfully achieved System and Organization Controls (SOC) 2 Type 1 Compliance. The completion of the audit demonstrates Forward Network's commitment to transparency, privacy, and data security for customers.

Accelerate Digital Transformation with SD-WAN

In today’s rapidly evolving digital landscape, businesses face numerous challenges when it comes to achieving seamless connectivity, optimizing their IT infrastructure, and staying ahead of the competition. Traditional hub-and-spoke or backhaul network architectures often struggle to keep up with the increasing demands placed on them by the adoption of cloud services, growing distributed workforces, and the need for robust disaster recovery capabilities.

How to Effectively Communicate IT Security to the Executive Board: 7 Best Practices

Regular communication with CISOs may not be enough for the board to fully understand and adequately invest in cybersecurity. According to a survey conducted by Neustar International Security Council in November 2022, only 49% of organizations have the requisite budget to meet their cybersecurity needs. Thus, only half of all CISOs receive enough resources to enforce effective cybersecurity strategies.

Coffee Talk with SURGe: the Interview Series featuring Eva Galperin

Join Audra Streetman and special guest Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation, for an interview about data privacy, stalkerware, artificial intelligence, and the recent rise in deepfake sextortion schemes. You can follow Eva on Twitter (aka X) @evacide and learn more about her work at EFF.org.