Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Basic Guide to SQL Server Security Fundamentals

Organizations today collect and generate enormous volumes of sensitive data. Much of it is stored in SQL Server databases, making SQL Server security management crucial for protecting critical applications and services. Implementing strong Microsoft SQL Server security measures helps organizations defend against cyber threats and comply with regulations like GDPR, HIPAA, and PCI DSS.

Enhanced VRM solution unlocks how organizations manage, monitor, and maintain oversight of third-party risk

It’s no secret that managing vendor risk is one of the most challenging aspects of any security program—our most recent State of Trust report found that one in two businesses have terminated a vendor relationship due to security concerns. The rapid proliferation of SaaS tools and AI technologies only ups the ante by increasing the complexity of vendor monitoring and oversight. ‍

Alert: Phishing Attacks Use New JavaScript Obfuscation Technique

Researchers at Juniper Threat Labs warn that phishing attacks are utilizing a new obfuscation technique to hide malicious JavaScript. “While investigating a sophisticated phishing attack targeting affiliates of a major American political action committee (PAC) in early January 2025, Juniper Threat Labs observed a new JavaScript obfuscation technique,” the researchers write.

Q&A with Martin Kraemer on Information Sharing in Cybersecurity

Recently, Dr. Martin J. Kraemer, Security Awareness Advocate at KnowBe4, and Dr. William Seymour, Lecturer in Cybersecurity at King’s College London released a Whitepaper called: “Cybersecurity Information Sharing as an Element of Sustainable Security Culture,” which examines how people consume and share cybersecurity information, revealing the role that workplace training plays in fostering information sharing among colleagues.

The Microsoft Security Score: The Future Benchmark of Enterprise Security and Trust

Trustwave has engaged with hundreds of enterprise customers across Australia and worldwide, and one overarching theme continues to emerge. Cybersecurity is no longer an IT problem; it is a core business concern. Executives, board members, procurement teams, and even marketing departments are beginning to realize that security is not just about preventing breaches but about establishing trust, enabling business, and gaining competitive advantage.

Jit + Orca Security: Correlate Cloud and Application Security for Smarter Risk Management

Today, we’re excited to announce Jit’s integration with Orca Security! This partnership enables security teams to correlate cloud security risks with application security risks to understand how the security of one resource impacts another. Security teams today struggle with siloed tools and security insights, as well as inconsistent prioritization methods across tooling.

It's Time Developers Say Goodbye to Code Vulnerability Backlogs

Without the widespread developer adoption of security tools, it's extremely difficult to build secure applications in the cloud. Developers aren’t security experts, which is why development teams will leverage application security tools – like SAST, SCA, IaC Scanning, secrets detection, and other technologies – to scan their code and surface vulnerabilities. These tools are often resisted by developers.

Announcing the Launch of the COR Compliance Package: Stay Ahead of DORA Regulations

Starting this year, financial institutions (FIs) and crypto-asset service providers (CASPs) in the EU are now required to ensure compliance with complex frameworks that protect digital infrastructure and financial services.

Fireblocks x AWS: A Blueprint For Tokenized Asset Deployment and Management

The real-world asset tokenization market is projected to reach $200 billion by 2030, underscoring the enormous potential in this space. However, bringing digital assets to market presents non-trivial considerations and a need for infrastructure providers and software vendors to collectively fulfill functional and non-functional tokenization platform requirements.

The Definitive API Security Testing Checklist [XLS download]

What would happen if a malicious actor managed to access your API without authorization and compromise sensitive user data? The repercussions can be horrendous. You could incur significant financial losses or even worse harm your reputation. There is also a higher risk of security, just last year a 37% increase in API security incidents were reported. which means that developers of API-based goods and services need to pay extra attention to this.