Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Reducing Risks of Real-Time Payments Adoption

2023 might be a really important year for real-time payments (RTP) development in North America. FedNow, a real-time payments service, is on track to go operational in 2023 in the USA, while the Real-Time Rail (RTR) payment system will be fully launched in Canada, also in 2023. Currently, in their test phases, these payment systems will go mainstream next year, making faster payments more accessible to smaller financial institutions and businesses.

Ruby gem installations can expose you to lockfile injection attacks

In this post, we’ll look at the security blindspots of lockfile injection that a Ruby gem might expose via its Gemfile.lock. As a prelude to that, we will open up with a brief introduction to Ruby and third-party dependencies management around RubyGems and Bundler. Web developers often work on Ruby projects, but are mostly referring to them as the popular open source web application framework Ruby on Rails.

3 Security Lessons We Haven't Learned From the Kaseya Breach

Not everyone had the luxury of enjoying BBQ and backyard time during Fourth of July weekend. Kaseya, an IT management software provider, spent their 2021 holiday fighting a ransomware attack. You likely saw news of the attack in headlines over that holiday weekend, especially considering Kaseya is a technology provider to thousands of managed service providers.

Understanding cyber security vulnerabilities

Every other day, a new cybersecurity breach compromising common or 0-day vulnerability is reported. The rapid shift of digital businesses and remote work opened a whole arena for cyber attacks and increased the demand for solid defences. But, to stay ahead of adversaries, it is critical that you know what cyber security vulnerabilities are after too.

The Evolution of Application Security in a Cloud-Native World: Q&A with Chris Wysopal

As technology explodes, so do the threats. Point solutions emerge as security players innovate in order to keep up. This creates the need for consolidation, as the fragmented solutions become too much to manage. We’re entering a consolidation phase now, the process of distilling, refining, and letting the cream rise to the top. We sat down with cybersecurity veteran and vigilante, Chris Wysopal, to get his perspective on emerging trends in cloud-native security.

The State of Security: SIEM in 2022

The world of enterprise cybersecurity is exceedingly dynamic. In a landscape that is ever-changing, security professionals need to combat a class of evolving threat actors by deploying increasingly sophisticated tools and techniques. Today with enterprises operating in an environment that is more challenging than ever, Security Information and Event Management (SIEM) platforms play an indispensable role.

Sponsored Post

The Top 5 Most Dangerous Cyber Attacks of all Time

Cyber attacks are on the rise, and they show no signs of slowing down. In fact, many experts believe that we are only seeing the tip of the iceberg when it comes to cybercrime. As businesses continue to move their operations online, they become increasingly vulnerable to cyberattacks. In this blog post, we will take a look at the five most dangerous cyberattacks in history. These attacks have caused billions of dollars in damage and affected millions.

Avoid These Employee Monitoring Blunders

In September 2021, 45% of full-time employees were still working remotely, and the trend is hard to reverse. People like the freedom of working from home. Without a commute, they save time. Without a boss looming in the background, they can multi-task at home. And, without an office full of colleagues, they don’t have to worry about dressing up or having water cooler chit-chat. While employees see these changes as positives, businesses see remote workers as a bit of a risk.