Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Congrats on your SOC 2 Report! Here's What to Do Next

After tons of hard work, your company has successfully completed a SOC 2 audit and received a well-deserved SOC 2 report! Congratulations! Receiving your SOC 2 attestation is no easy feat, and it’s a significant milestone that demonstrates your company’s commitment to security and trust assurance. If you’re not sure what to do next, no worries – the hard part is done.

Software Composition Analysis Explained

Open source code is everywhere, and it needs to be managed to mitigate security risks. Developers are tasked with creating engaging and reliable applications faster than ever. To achieve this, they rely heavily on open source code to quickly add functionality to their proprietary software. With open source code making up an estimated 60-80% of proprietary applications’ code bases, managing it has become critical to reducing an organization’s security risk.

How to Establish Cross-Border Transfer Systems that Help Protect Privacy

Cybersecurity, privacy and data flows will be key topics at this year’s G7 in Japan. Against this backdrop, it has been a year since last year’s amendments to the Act on Protection of Personal Information (APPI) introduced revised data breach reporting and cross-border data flow rules. Meanwhile, developments in the Asia-Pacific (APAC) region have introduced data localization obligations in a variety of countries.

U.K. Advance Fee Scams Increase by Over 600% in Less Than Two Years

New data from the U.K.’s Office of National Statistics shows that this often overlooked scam has grown significantly in interest – likely because it pays off. If you’re not familiar with this kind of scam, it’s pretty simple: the scammer presents the victim with an opportunity for a grant, a prize – something of value – but requires a small payment up front (often called a processing fee, etc.).

Cyber Insurance Demand Grows as Cybercrime is Expected to Rise to $24 Trillion by 2027

As cyber attacks continue to grow in sophistication, frequency, cyber insurers are expecting their market to double in the next two years. I’ve spent a lot of time here on this blog educating you on attack specifics, industry trends, and the impacts felt by attacks. I’ve also talked quite a bit about cyber insurance and the trends therein. But seldom have we been able to combine the two and present the state of cyber attacks from an insurer’s perspective.

EP 27 - How Identity Factors into DevSecOps

In today’s Trust Issues episode, Dusty Anderson, a managing director of Global Digital Identity at the consulting firm Protiviti, digs into all things DevSecOps and cautions against a one-size-fits-all approach. In conversation with host David Puner, Anderson emphasizes the significance of strategic planning and well-defined goals – demonstrating how bite-sized steps can add up to major security wins and bottom-line benefits over time.

Cyberattack Maps Explained: The Value & Limitations of Cyber Attack Maps

While most people understand that cybercrime is rising, it’s challenging to fathom just how widespread it is. In 2007, researchers found there was a cyberattack every 39 seconds. By 2022, those numbers seemed small and innocent in comparison: The sheer scale of attacks makes it a challenge to understand and find emerging threats or identify trends. Cyberattack maps provide visuals that clarify numbers that can be otherwise difficult to understand and bring to light the dark activities online.