Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Vanta announces enhanced Access Reviews solution

Vanta is thrilled to announce an enhanced Access Reviews solution. Thousands of customers already use Vanta’s existing access reporting to help demonstrate compliance during audits, reduce risk, and build a strong compliance and security posture. But now it’s leveled-up in a big way. ‍ The enhanced Access Reviews solution is currently in beta and available for purchase.

Tigera: Detect and mitigate container-based threats with Calico Cloud

Organizations are increasingly adopting Kubernetes and containers to build their applications. To secure these applications, they are leveraging security platforms to detect and prevent security threats based on suspicious activity at the container level, such as processes and malware during runtime, and also from network-based threats.

JFrog's security scanners discovered thousands of publicly exposed API tokens - and they're active! The Full Report

Note: This report was previously published in InfoWorld When developing the recently announced JFrog Advanced Security, our Research team decided to try out its new “Secrets Detection” feature. Our goal was to test our vulnerability detection on as much real world data as possible, to make sure we eliminate false positives and catch any bugs in our code.

Why KYC is an effective tool against Digital Fraud in Money Services Businesses (MSB)

MSB services have come to the rescue of many, who can’t access banks immediately and want to transfer money or carry out trade exchanges. So, it surely provides time and place convenience. We all know MSB services include cash acceptance for a transaction or currency exchange, global remittance services, check cashing outlets, and facilitating payments between payer and provider without the performing KYC verification.

Defending Against Cloud Security Threats: Breaking Down Initial Access Techniques

As organizations continue to move their business operations into the cloud, the expanded attack surface generated by the “digital transformation” continues to present new opportunities for threat actors. Luckily, strategies to mitigate these new risks do exist and, as always, these center around the techniques and tactics of the adversaries.

Q3 2022 Threat Landscape: Insider Threat, The Trojan Horse of 2022

In Q3 2022, Kroll saw insider threat peak to its highest quarterly level to date, accounting for nearly 35% of all unauthorized access threat incidents. Kroll also observed a number of malware infections via USB this quarter, potentially pointing to wider external factors that may encourage insider threat, such as an increasingly fluid labor market and economic turbulence.

Prepare, respond & recover: Battling complex Cybersecurity threats with fundamentals

The cybersecurity industry has seen a lot of recent trends. For example, the proliferation of multifactor authentication (MFA) to fight against credential harvesting is a common thread. Threat actors have been creating legitimate-looking phishing campaigns, which have been a big driver for this trend. Although some of the tools for MFA can be complex, proper authentication/authorization is an absolute fundamental that every enterprise should embrace.