Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Assessment in Healthcare: Knowing What Data You Have Is Half the Battle

When it comes to protecting personal healthcare information or a medical facility from cyberattacks or data breaches, the first step that must be taken is a thorough and exhaustive data assessment. The data assessment will provide your organization with a complete understanding of: Why? Because a cybersecurity team cannot be expected to protect something if it does not know it exists in the first place.

ServiceNow - Username Enumeration Vulnerability (CVE-2021-45901)

During a recent engagement Trustwave SpiderLabs discovered a vulnerability (CVE-2021-45901) within ServiceNow (Orlando) which allows for a successful username enumeration by using a wordlist. By using an unauthenticated session and navigating to the password reset form, it is possible to infer a valid username. This is achieved through examination of the HTTP POST response data initially triggered by the password reset web form. This response differs depending on a username's existence.

3 Payment Security Challenges to Expect in 2022 (And How to Overcome Them)

Over the past two years that we have lived with the pandemic, the world has changed dramatically. Those changes provided financial criminals with great opportunities to take advantage of many businesses when they were at their most vulnerable, trying to adjust to a new reality. Remote working environments, the ongoing digitization of services, COVID-19 restrictions – all have contributed to the development of new cyber threats and techniques.

6 challenges when protecting a distributed workforce

When employees connect to professional networks remotely the cyber-threat level rises. Elements such as the expansion of the security perimeter of organizations when working remotely or the proliferation of threats from COVID-19-related topics have changed the way we understand cybersecurity. But there are other, more specific challenges that make it more difficult for MSPs to protect clients that have a remotely distributed workforce. These 6 challenges are.

Could You Outsmart a Phishing Scam?

We’ve all had it happen. You receive an email telling you that you’ve won a prize draw you never entered or a foreign prince wants to transfer you a huge sum of money and needs your bank details. These obvious scams can be spotted from a mile away and are what we tend to think of when we think of phishing, but it’s not always that apparent. Over the years, phishing scams have become harder to detect and many have fallen victim as a result.

The Essential Guide to Understanding the DevOps Lifecycle

DevOps has revolutionized how software is developed and deployed by introducing a more collaborative environment for development and bridging the gap between developers and operations. All the while ensuring flexibility to meet any consumer or market demands. However, it would be best if you implemented a proper DevOps lifecycle in your organization to take full advantage of all the benefits offered by DevOps.

The Essential Guide to Understanding the DevOps Lifecycle

DevOps has revolutionized how software is developed and deployed by introducing a more collaborative environment for development and bridging the gap between developers and operations. All the while ensuring flexibility to meet any consumer or market demands. However, it would be best if you implemented a proper DevOps lifecycle in your organization to take full advantage of all the benefits offered by DevOps.

Introducing Datadog Application Security

Securing modern-day production systems is expensive and complex. Teams often need to implement extensive measures, such as secure coding practices, security testing, periodic vulnerability scans and penetration tests, and protections at the network edge. Even when organizations have the resources to deploy these solutions, they still struggle to keep pace with software teams, especially as they accelerate their release cycles and migrate to distributed systems and microservices.

What is Penetration Testing: Definition, Methods, and Examples

The frequency and severity of cybersecurity attacks are increasing with each passing year. That's why many organizations are now putting greater focus on different ways to withstand online attacks. There are also regulations like HIPAA, PCI, GDPR, and DSS that mandate periodic penetration testing in order to remain current with all requirements.