Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Adaptive cybersecurity: 3 strategies that are needed in an evolving security landscape

Cybersecurity is no longer an outlandish concept to many business enterprise executives. What is still relatively unfamiliar to many organizations and their leadership, however, is the task of evaluating their cyber strategy and risk to determine how best to adapt and grow to stay secure while remaining competitive. Executives must initiate thorough evaluations of their existing cybersecurity strategies to figure out which types of new technologies and risk management strategies they need the most.

Credential management best practices for business process automations

This webinar recording gives you a clear picture of the various credential-related perils that can surface because of implementing business process automation (BPA) workfows in your enterprise. Ganesh, our in-house IT security expert will walk you through the risks associated with hard-coding privileged credentials within application scripts and also provide you with a handful of security best practices to mitigate the risks and fortify your IT infrastructure from credential exposure through PAM360.

Shape of the New | Global Art Market Webinar Series - Part 2: Regulation and Risk

Our two-part roundtable webinar series on the future of the global art market, features guests from Hauser & Wirth, HMRC, Demif Gallery and The Society of London Art Dealers. Presented by Gareth Fletcher of Sotheby’s Institute of Art, the series explores change and transformation in the art market, from new technologies, ways of viewing and buying art, and market supervision, to digital art crime, the rise of African artists, and the illicit trade in art and antiquities.

Veracode Hacker Games: The Results Are In!

The first ever Veracode Hacker Games competition has come to a close, but were the flaws in favor of our brave competitors? Read on to find out. Over the course of the two-week challenge, students from several universities in the U.S. and the U.K. came together to explore vulnerabilities and threats that they’ll one day face on the job.

Fighting Digital Payment Fraudsters in Real-time: A Winning Framework (Part 2)

A customer walks into a bank, asks a question at the information desk, and then leaves. Later that day an operations manager notices an unmarked USB device left on the counter. He doesn’t remember who might have left it, so he plugs it into his computer to see if he can potentially spot the owner. As the USB loads, the malware shuts down the entire system, while the hackers get the bank’s customers’ account details.

Mixing the Perfect Vodka Martini Can Teach Enterprises a lot about Data Protection

What do data protection and the perfect vodka martini have in common? Quite a bit. For one thing, they’re both comforting to have around when things go wrong. More importantly, they're both made up of multiple ingredients and need premium products to work well together. It doesn’t matter how much flair you bring to serving that cocktail – without high-quality products and the right technique, you’re essentially serving a few ounces of vodka and vermouth.

NIST SP 800-172 (Formerly SP 800-171B) Release Couldn't Come at a Better Time

NIST’s timely new release of Special Publication (SP) 800-172 (formerly referred to in draft form as 800-171B) provides exactly what its title says, Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST SP 800-171. Yet it goes a step further to protect controlled unclassified information (CUI) specifically from APTs.