Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Crossword Cybersecurity's Identiproof demonstrates early commitment to Open Badges V3 in the Jobs for the Future Plugfest

Crossword Cybersecurity Plc is pleased to announce that its Identiproof verifiable credentials (VC) product has successfully achieved its first milestone at the recently held Jobs for the Future (JFF) Plugfest.

5 Cybersecurity Trends Impacting Mid-Sized Organizations in 2022

Egnyte just released its Cybersecurity Trends for Mid-Sized Organizations report, a mid-year update to its annual Data Governance Trends Report. The study provides key insights into how mid-sized organizations manage cybersecurity amid rapidly increasing cyberthreats. The survey of IT executives underscores their concerns about cyber insurance premiums, content sprawl, incident response plans, and more.

Kubescape: A Kubernetes open-source platfrom providing a multi-cloud Kubernetes single pane of glass

Kubescape is a Kubernetes open-source platform providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer, and image vulnerabilities scanning.

Why We Don't Charge Extra for Additional Logins

We charge 0$ for additional login at SecurityScorecard. Here's why: One of our company values is customer-centricity. So we asked ourselves: "What's best for the customer?" What's best for customers is to give logins to as many people in the organization as possible. We want every team in the organization to benefit from the insights provided by the SecurityScorecards, including: This way, everybody knows the risk of entering into a proof of concept engagement or signing a contract with a vendor or service provider.

How can SOC analysts use the cyber kill chain?

Security Operation Centers (SOCs) offer a robust method of ensuring cybersecurity and safety within an organization. Their demand has continued to grow, specifically with a significant rise in cyber-attacks amidst a looming cybersecurity skills gap. However, despite a typical SOC analyst's immense training and knowledge, mitigating the increase in cyber-attacks is no easy job.

A Brief Guide to Cloud-Native Applications, Technology, and Security

What are cloud-native applications? According to the Cloud Native Computing Foundation (CNCF), the term “cloud native” describes systems that are specifically designed to help build and run scalable applications in all cloud environments, including public, private, and hybrid clouds. Cloud-native applications use the attributes of cloud architecture in ways that legacy systems can’t. They don’t need any onsite computing infrastructure and can scale quickly to meet demand.

Webinar: Top Security Threats Worldwide: Q1 2022 - 30 June 2022

Join WatchGuard CSO Corey Nachreiner and Security Engineer Trevor Collins as they cover the latest Internet Security Report from the WatchGuard Threat Lab. In this session, Corey and Trevor will dive into the attack trends and latest malware variants targeting WatchGuard Firebox and Endpoint customers worldwide.

WebAuthn Explained

The WebAuthentication API, or WebAuthn, facilitates secure authentication based on public-key credentials. The idea of passwordless and public-key authentication is not new, but the compatibility and interoperability of various elements in the authentication process were always weak. WebAuthn API aims to solve that problem by bringing the uniform authentication API into web browsers.