Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Need for Speed: "Material" Confusion under the SEC's Cyber Rules

This week, the SEC issued a statement addressing some of the rampant confusion and inconsistencies observed under the agency’s new cyber breach disclosure rule. The statement itself addresses a technical securities law requirement, that public companies should only use Item 1.05 of Form 8-K to disclose “material” cyber breach information (instead of making voluntary or immaterial disclosures).

New Charlotte AI Innovations Enable Prompt Collaboration and Demystify Script Analysis

Since CrowdStrike Charlotte AI became generally available, we’ve seen firsthand how genAI can transform security operations, enabling teams to save hours across time-sensitive tasks and accelerate response to match the speed of modern adversaries.

Challenges of Adopting Zero Trust

The world has changed. With the move to hybrid working, the rapid adoption of cloud, increased use of mobile and IoT devices, and more, every organization’s attack surface has expanded and businesses are finding it harder than ever to protect their networks and digital assets. This will undoubtedly be the central theme for this year’s Cybersec Europe.

Bugcrowd Acquires Informer

It is a proud and exciting day for me to announce that Bugcrowd has acquired Informer. On this momentous day, I can’t help but take a walk down memory lane, thinking about the past decade of hard work and innovation that led us to this moment. Ten years ago, I founded a specialist penetration testing business called The Security Bureau. As our client base grew, certain patterns emerged and it became clear that many organizations were unsure of exactly which assets were internet-facing.

The Double-Edged Sword of Artificial Intelligence (AI) in Cybersecurity

As artificial intelligence (AI) continues to advance, its impact on cybersecurity grows more significant. AI is an incredibly powerful tool in the hands of both cyber attackers and defenders, playing a pivotal role in the evolving landscape of digital threats and security defense mechanisms. In this blog, let’s explore the ways AI is employed by attackers to conduct cyber attacks, and how defenders are using AI to deter and counter threats.

How to Transform Your Workspace into a Smart Office

Welcome to the future of work! In this article, we're going to show you how to turn your ordinary workspace into a Smart Office, filled with cutting-edge technologies and innovative solutions. By embracing smart devices and leveraging the power of automation, you can enhance productivity, streamline tasks, and revolutionize collaboration in your workplace. Let's dive in and discover the game-changing benefits of transforming your workspace into a Smart Office.
Featured Post

How to Choose the Right ASVS Level for Your Organization

The Application Security Verification Standard (ASVS) developed by the Open Web Application Security Project (OWASP) provides a robust framework for conducting penetration testing (pentesting) and security audits of web applications and infrastructure. In the evolving landscape of network security, with risks emerging in sophistication and frequency, maintaining a baseline level of compliant security procedures is highly recommended.

Securing the Chain: A Comprehensive Guide to Blockchain Security Audits

In the realm of digital business, blockchain security audits are essential for implementing the best security practices and ensuring robust system security. It secures all complex online systems and networks, thereby enhancing their performance and ensuring compliance with modern standards. According to SlowMist's blockchain hacking incident archive, there were 464 security incidents in 2023, resulting in losses of up to $2.486 billion.