Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2023

The Secret's Out: Researchers Reveal Backdoor in Emergency Radio Encryption

For over 25 years, a technology utilized for vital data and voice radio communications globally has remained under wraps, preventing in-depth testing for potential vulnerabilities. However, a small group of researchers in the Netherlands has now shed light on it, uncovering significant flaws, including a deliberate backdoor.

1.2 Million Patients Lose Data to Tampa General Hospital Breach

Tampa General Hospital is a mid-sized medical facility that caters to locals in the Tampa area. The hospital has 1,040 beds available and serves as a research and academic center, along with offering tertiary care to its patients. The facility is located in Tampa, Florida, and is an essential hospital for maintaining the care of patients throughout the area. The hospital was recently hacked, exposing more than 1.2 million patients that depend on the facility for medical services.

Highlights From Impact Boston 2023

IMPACT is CyberArk's annual customer and industry conference. More than 3,000 security leaders and practitioners participated in Boston and virtually to discuss the ever-expanding attack surface, attacker techniques and trends in identity-based cyberattacks, and the latest innovations in Identity Security technology. In-person attendees took advantage of hands-on product training and labs sessions, and obtained valuable certifications, as well as exchanged best practices and learnings with other customers.

SBOMs: A Roadmap for a Secure Software Journey

Software supply chain threats and increasing regulatory pressures make supply chain security a top priority for software organizations. While building secure applications is a must for any organization, the path to creating secure software is anything but clear. Software bills of materials (SBOMs) have emerged as an essential tool and a roadmap for organizations on their secure software journey.

Mend.io Product Overview Demo

Mend.io solves the toughest problems in application security for the largest and most demanding organizations in the world, and we do it with automation. Mend.io was the first application security vendor to provide automated remediation workflows for both open source and custom code. We have centered our product strategy on providing industry-leading prioritization of application security threats for both OSS and custom code, integrating automated dependency health to reduce the attack surface and ensuring fast and limitless scale to onboard developers and applications.

Corelight CEO, Brian Dye talks to NYSE's Trinity Chavez on 'The Cyber Series'

What is network detection and response, how is it fundamental to #cybersecurity, and why should #investors and #security leaders be investing in the #NDR space? Watch as Corelight CEO Brian Dye shares the answers to these questions and more in a new interview with NYSE.

What is SSL Certificate Expiration?

Your site has been configured with a SSL/TLS certificate from a trusted authority, but you're receiving risk findings that say your SSL certificate expired or is expiring. How can that be and what does it mean for your organization's cybersecurity? SSL/TLS certificates provide a critical security layer for your public web systems using the transport layer security (TLS) protocol (and its predecessor secure sockets layer or SSL).

AWS threat emulation and detection validation with Stratus Red Team and Datadog Cloud SIEM

As attackers get more creative in their malicious tradecraft, cloud security teams must be able to keep up with detections that provide adequate coverage against the diverse threats to their cloud environments. Threat emulation enables cloud security teams to leverage their understanding of threat actor behaviors as a feedback loop for developing cloud-based detections and validating their resilience.

Compliance? WhiteHat Dynamic has you covered

WhiteHat™Dynamic delivers the compliance testing you need, without slowing down development. Your business runs on an ever-changing combination of software you build, software you borrow, and software you buy. Of course you need run your business at the speed of software, but these ever-changing apps and systems can contain vulnerabilities that can be exploited to disrupt, threaten, and steal essential data.