Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why IDcentral's AML Screening solution is dubbed End-to-End AML Compliance

The term Anti Money Laundering is abbreviated as AML. It is mostly used in the financial, legal, and compliance sectors to define the standard procedures that firms and organisations must implement in order to detect, identify, and report suspicious money laundering behaviour that may occur while carrying out their activity. AML compliance standards focus on anti-money laundering processes that deter and prohibit potential violators from participating in money laundering fraud or crime.

Integrity Monitoring Use Cases: Compliance

The IT ecosystems of enterprises are highly dynamic. Typically, organizations react to this volatility by investing in asset discovery and Security Configuration Management (SCM). These core controls enable businesses to compile an inventory of authorized devices and monitor the configurations of those assets. In addition to managing changes to their infrastructure, organizations must also keep an eye on the changes made to essential files.

An Introduction to the State and Local Cybersecurity Grant Program (SLCGP)

Cybersecurity funding in corporate environments has always been a source of anxiety for those who seek to keep organizations safe. When we examine the cybersecurity readiness of many state, local, and territorial governments, this funding struggle is taken to new heights of scarcity. Fortunately, a new program has been created by the Department of Homeland Security (DHS) to improve this shortfall, and better protect municipalities in the United States.

Things to Know about Sectigo Code Signing Certificate

Here is everything you need to know about Sectigo code signing certificates. Software security is one of the key concerns of businesses around the world. As the number of cyberattacks is increasing, it has become vital for businesses to ensure that their software is received graciously by the audience. This is where code signing steps in. Code signing is a process of signing the software code or driver with a digital signature using a code signing certificate.

Remote Code Execution Vulnerability Discovered in HSQLDB

19.10.2022 - As part of our goal to continuously improve our vulnerability detectors, we continuously test various open-source projects with Jazzer within OSS-Fuzz. In this case, a test run yielded a severe finding with a potential remote code execution in a HSQLDB (CVE-2022-41853).

Detecting and mitigating CVE-2022-42889 a.k.a. Text4shell

A new critical vulnerability CVE-2022-42889 a.k.a Text4shell, similar to the old Spring4shell and log4shell, was originally reported by Alvaro Muñoz on the very popular Apache Commons Text library. The vulnerability is rated as a critical 9.8 severity and it is always a remote code execution (RCE) which would permit attackers to execute arbitrary code on the machine and compromise the entire host.

Despite Lowest Software Flaw Frequency, Manufacturing's Fix Times Lag and Create Ransomware Risk

In 2021, manufacturing became cybercriminals’ most targeted industry as a surge in global ransomware attacks disrupted manufacturing operations and exacerbated supply chain woes. This put even more pressure on manufacturing organizations that were already feeling the heat. Recognizing that ransomware attacks can stem back to software vulnerabilities, many manufacturers are exploring ways to strengthen their software security programs.

Stranger Danger: Your Java Attack Surface Just Got Bigger

Building Java applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome, you're a cloud native application developer! As developers, our responsibility broadened, and more software means more software security concerns for us to address.

User Office Hours | How to Secure CI/CD Pipeline w/ GitHub Actions & Snyk | Mar 23, 2022

This User Office Hours session covers how to build a secure CI/CD Pipeline with GitHub Actions and Snyk. First, we'll build a demo application. Then, we'll walk through how to test for security issues using Snyk Open Source and Snyk Code. We'll then go on to deploy a container image. Missed the live stream? Feel free to ask questions in the comment section, and we'll do our very best to answer them.

Solving Cross-Border Payment Challenges: New Players, New Risks, and New Technology

Over the last few years, rapid digital payment adoption and technology development have played an essential role in making international money transfers cheaper, faster, and easier than they were decades ago. The volume of cross-border transactions is now expected to grow to $39.9 trillion by 2026, as these payments are essential in the interconnected economy.