Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Why SCA is Critical for Securing the Software Supply Chain

Weaknesses within software supply chains create a foothold for exploitation from cyberattacks. The problem is so significant that even the White House released an Executive Order that speaks directly on this topic. “The Federal Government must take action to rapidly improve the security and integrity of the software supply chain,” states the Executive Order emphatically. Now, you may be wondering what your organization can do to mitigate this risk.

Healthcare Threat Landscape 2022-2023: Common TTPs Used by Top Ransomware Groups Targeting the Healthcare Sector

The healthcare sector has been under constant threat from cybercriminals due to the sensitive nature of patient data and the valuable information held by healthcare providers. This blog analyzes the ransomware landscape for the healthcare sector for the years 2022-2023. This report uses data compiled for the recently released Trustwave SpiderLabs research: Cybersecurity in the Healthcare Industry: Actionable Intelligence for an Active Threat Landscape report.

Voices from Validate: Bridging the Gap - Communicating Security Risk to the Board

SafeBreach recently held its second annual Validate Summit at The Star in Frisco, Texas, where SafeBreach customers, cybersecurity experts, and influencers explored how enterprises can stay ahead of risk and safeguard their critical business assets from inevitable cyberattacks by implementing proactive security practices. One hot topic was communicating security risk to the board.

Monitor 1Password with Datadog Cloud SIEM

1Password is a password manager that helps organizations reduce the use of weak and reused credentials across their teams. Because your organization uses 1Password to store highly sensitive information, including passwords, access keys, and secret tokens, monitoring logs generated by activity in your 1Password environment can be useful, as unexpected patterns of behavior could indicate malicious activity by attackers.

Rezilion Uncovers High-Risk Vulnerabilities Missing from CISA KEV Catalog, Challenging Current Patching Prioritization Standards

Rezilion announces new report, "CVSS, EPSS, KEV: The New Acronyms - And The Intelligence - You Need For Effective Vulnerability Management," detailing the critical importance of the Exploitability Probability Prediction Score (EPSS) for enhancing patch prioritization and effective vulnerability management.

Forward Networks Achieves SOC 2 Type 1 Compliance, Demonstrating Commitment to Transparency and Data Security

Forward Networks announces it has successfully achieved System and Organization Controls (SOC) 2 Type 1 Compliance. The completion of the audit demonstrates Forward Network's commitment to transparency, privacy, and data security for customers.

Protegrity and Exasol extend partnership, enabling customers to take advantage of today's rapidly evolving API economy

Integration with Protegrity's Application Protector REST API enhances Exasol's data protection capabilities and enables support for multi-cloud, on-premise and hybrid environments, providing customers with the most advanced and comprehensive data protection capabilities.
Featured Post

Why Fuzzing isn't enough to Test your APIs

In today's fast-paced development environment, a comprehensive API security testing strategy is no longer a luxury, but a necessity. Testing your APIs for security gaps ensures that your APIs functions are reliable, secure, and perform as expected under different circumstances. It helps to identify issues such as incorrect data formats, missing or inaccurate data, and faults in authentication or authorisation.

CVSS + EPSS + KEV: Why You Need All Three to Effectively Manage Vulnerabilities

Security and development teams know that managing vulnerabilities is complex and challenging. The ultimate aim of a vulnerability management program is to minimize the organization’s overall risk exposure by identifying, prioritizing, and resolving vulnerabilities that impact its assets and environment. Attackers frequently exploit known vulnerabilities to gain access to the organization.

Introducing the Next Generation of AI at Egnyte

For nearly a decade, Egnyte has been applying AI to help customers protect and manage large volumes of unstructured data. The outputs of these models were historically focused on a relatively narrow set of IT security, privacy, and compliance applications. Today, we’re announcing the next generation of AI-powered solutions at Egnyte, unleashing content intelligence for every user on our platform!