Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Australia Set to Reform Cybersecurity Rules

Australia is leading the way when it comes to improving overall cybersecurity for the country. The government recently announced the Australian Cyber Security Strategy aimed at improving IT infrastructure to maintain a high level of security for agencies, businesses, and users. Their goal is to create the most cyber secure nation in 2023.

Launching GitGuardian Honeytoken: your powerful ally to detect any breaches in the supply chain!

What if you could detect intrusion and code leakage early in your software supply chains? Introducing GitGuardian Honeytoken, the solution that protects your software supply chains against potential intrusions on SCM systems, CI/CD pipelines, software artifact registries, and more.

Trustwave Announces Operational Technology Security Maturity Diagnostics

Trustwave has just launched OT Security Maturity Diagnostic, which is an assessment and advisory service centered on ensuring the security of industrial automation and control systems. OT Diagnostic by Trustwave is optimized to gain insight into an organization’s current state of OT security across people, processes, and technology.

Customize rules for detecting cloud misconfigurations with Datadog Cloud Security Management

For organizations in highly regulated industries, any misconfiguration in their cloud environments can be detrimental to customer trust and privacy if overlooked. To mitigate this risk, DevOps and security engineers follow recognized compliance standards to quickly surface issues in their AWS, Azure, or Google Cloud environments. Organizations can take this work a step further by developing detection rules tailored to their unique business or security goals.

Oracle's Arthur Barnes: The evolution of cybersecurity and solving the challenge of hiring the right team

In this episode of the Future of Security Operations podcast, Thomas interviews Arthur Barnes, Senior Director of Security Operations at Oracle – the world’s largest database management company. Arthur is an experienced cybersecurity leader with 20 years of experience, having previously worked at Pearson, Dell, and M&S.

Foresiet Discovers Data Breach of Texas Healthcare Company

In a recent dive into the deep web, Foresiet, the cyber security firm has made a shocking discovery. Our team has uncovered a massive data breach of a healthcare company in Texas, US. The data breach has resulted in the exposure of sensitive patient information and has left the affected patients vulnerable to identity theft and other serious consequences. The Breach Details During our deep web exploration, we stumbled upon a downloadable link to the breached data.

Top 5 uses of blockchain in supply chain

It’s April, designated National Supply Chain Integrity month by CISA, NCSC, ONCD and Department of Defense, to promote resources, tools, and information to help organizations and agencies secure their supply chains and build resilience. But what role does blockchain play in supply chain and how easy is it to implement? Blockchain technology has numerous potential applications in supply chain due to its ability to provide a secure, transparent, and tamper-proof ledger of transactions.