Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Trustwave SpiderLabs Unveils the 2024 Public Sector Threat Landscape Report

Trustwave SpiderLabs’ latest report, the 2024 Public Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies details the security issues facing public sector security teams as they try to strike a balance between supplying needed services and deploying the cybersecurity necessary to protect data placed in their charge. The need for the highest level of security has never been greater.

Scaling DevSecOps with Dynamic Application Security Testing (DAST)

In the swiftly evolving landscape of AI-driven software development, DevSecOps helps strengthen application security and quality. Dynamic Application Security Testing (DAST) is a key tool that helps scale your DevSecOps program by facilitating continuous and accurate security tests on running applications. DAST simulates real-world attacks, enabling you to identify security weaknesses and evaluate your application's defenses in response to actual attacks.

Software to Track and Block USB Ports on Windows XP

To help you keep legacy systems protected against the dangers of USB devices, CurrentWare now offers a dedicated version of its USB blocker AccessPatrol for Windows XP, allowing you to easily monitor and block USB ports on Windows XP. With AccessPatrol USB port blocker for Windows XP you can create an “allowed list” of authorized USB devices, grant different access levels (read-only, full access, or no access), and get insights into file transfers to portable storage devices.

Best Practices - Email Security for Small Businesses

Cyber security for business email: Effective ways to protect your data and reputation Nine out of ten successful cyberattacks are launched by sending a phishing email. According to Statista, almost every third adult encountered some form of phishing attempt in 2022. In the US, this type of cybercrime remained the most prevalent in 2023.

Building your own AI app? Here are 3 risks you need to know about-and how to mitigate them.

After the debut of ChatGPT, and the ensuing popularity of AI, many organizations are leveraging large language models (LLMs) to develop new AI-powered apps. Amidst this exciting wave of innovation, it’s essential for security teams, product managers, and developers to ensure that sensitive data doesn’t make its way into these apps during the model-building phase.

How Torq Hyperautomation Simplifies Phishing Analysis for SOC Teams

2023 went down in history as the worst year for phishing attacks on record, with nearly 35 million attempted business email compromise (BEC) attacks detected and investigated, according to the Microsoft Threat Intelligence Cyber Signals report. Unfortunately, phishing analysis is one of the most time-consuming tasks for the SOC. Responding to a phishing incident requires careful examination.

Dell Data Breach: Hackers Expose Personal Info of 49M Customers for Sale

Dell Data Breach: What You Need to Know? Dell Technologies recently announced a data breach affecting a company portal, which compromised certain customer information linked to purchases. The breach exposed customer names, physical addresses, and detailed order information, such as service tags, item descriptions, order dates, and warranty details. Fortunately, Dell has assured that no financial data, email addresses, phone numbers, or other highly sensitive information were accessed during the incident.

CIO POV: Navigating the Deepfake Pandemic with Proactive Measures

We’re in the throes of another pandemic, but this time, it’s not transmitted through the air – it spreads with just a click. Welcome to the world of deepfakes. While COVID-19 significantly impacted our physical and mental well-being, deepfakes affect our minds differently. Their influence is causing confusion, mistrust and a distorted perception of reality, both personally and globally.