Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fare Thee Well ModSecurity: End-of-Life and Last Commercial Rules Update for June 2024

In June 2010, Trustwave acquired Breach Security, which brought with it the popular Open-Source Web Application Firewall ModSecurity for Apache. At that time, Trustwave relicensed the code under the Apache license. This relicensing allowed more public participation in the project, and 2012 saw the release of an IIS port from Microsoft and a port for Nginx.

Available Now: Veracode Scan for JetBrains IDEs

Veracode Scan for VS Code was one of the big hits on the expo floor at the RSA Security conference in May this year. People liked the integration of Veracode Static, Veracode SCA, and Veracode Fix into a single extension, giving developers the tools to scan their code and resolve problems with AI assistance while they are actively developing code.

Unlock Advanced Security Automation for Next-Gen SIEM

According to the CrowdStrike 2024 Global Threat Report, the fastest recorded eCrime breakout time was just 2 minutes and 7 seconds in 2023. This underscores the need to equip security analysts with modern tools that level the playing field and enable them to work more efficiently and effectively.

Kroll Responder Managed Detection and Response - Solution Overview

Stop cyberattacks now with Kroll Responder. In this video, learn how Kroll Responder Managed Detection and Response (MDR) provides extended security monitoring around-the-clock, earlier insight into targeted threats, and complete response to contain and eradicate threats across your digital estate. Discover how our turnkey MDR service can fill gaps in your security resources by combining seasoned security expertise, frontline intelligence and unrivaled response capabilities.

Your AI Governance Blueprint: A Guide to ISO 42001 & NIST AI RMF

As businesses increasingly rely on AI to drive innovation and efficiency, ensuring that these systems are used ethically and safely becomes paramount. We’re here to help you build your blueprint to effective AI governance, stay compliant with global standards, and mitigate potential risks.

Solving Tool Sprawl: The CISOs Guide to Efficient and Effective Security Operations

Time and time again, we see enterprise security teams facing complex issues that originate from a common pain point: tool sprawl. We get it; your footprint has grown, your tech stack is more complex than ever, and your security team is having to navigate this maze of “Wait, which dashboard do I use?” Perhaps it’s time for a change.

Why Artificial Intelligence (AI) Is Neither

Artificial Intelligence (AI) is the buzzword du jour of not just tech, but the entire online world. We see it in the daily headlines of everything from industry stalwarts such as Wired (There’s an AI Candidate Running for Parliament in the UK) through the stiff-collared set at the Wall Street Journal (What the Apple-OpenAI Deal Means for Four Tech Titans). Everyone who is anyone is talking about it, training it, or trying leverage against it.

Destructive Malware: Threat Detection and Incident Response

Imagine that you have a snack you want to eat while watching a movie on a Friday night. You look in your kitchen, only to find the snack missing. Whether a roommate hid the snack or ate it, you no longer have access to it, disrupting your evening plans. This destructive behavior interrupts your weekend objectives, but it’s pretty low stakes overall.