Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Four Insider Threats Putting Every Company At Risk

Few concerns keep business leaders up at night like the threat of a cybersecurity incident. With the average cost of a data breach exceeding $4 million for the first time and public sentiment, regulatory requirements and practical functionality firmly against companies that can’t protect their digital landscape, many leaders are reprioritizing cybersecurity in response to this increasingly urgent reality.

New Exchange RCE vulnerability actively exploited

Exchange admins now have another exploit to deal with despite still reeling from a number of high profile attacks this year including ProxyLogon and ProxyShell. A new high severity Remote Code Execution (RCE) exploit for on-premise Exchange Servers has been published and is being actively exploited in the wild.

SecurityScorecard: Clearing Security Hurdles Faster to Drive Business Forward in 2022

The only constant about cybersecurity is change, and the pace of change is significant. Every security challenge brings a new hurdle that organizations must adjust to faster. In 2021 alone we saw ransomware attacks demanding record sums of money, a shift in the way we think about trust in a remote-first environment, increasingly complex third-party supply chains, and the demand for security talent in a competitive market, to name a few. As we enter the new year, security leaders must make plans to address a quickly evolving threat landscape and transform security into a business enabler, not a hurdle.

Sysdig: Compliance with Containers & Cloud

Safeguarding sensitive data and meeting regulatory compliance requirements are top priorities for security teams. With all the agility gained from applications starting to run on containers in the cloud, the last thing the business needs is a slow down when code is ready for production. How do you avoid this? How do you map the controls for GDPR, NIST, PCI, and others in cloud native environments? In this webinar, you'll hear how Sysdig's Secure DevOps platform extends Red Hat OpenShift's security capabilities.

ManageEngine Vulnerability Manager Plus simplifies compliance with the CIS Benchmarks

New software and assets introduced into your network are, by default, configured to be multifunctional and convenient to use, but they’re not always the most secure. IT teams also make constant changes to systems’ configurations, leading to inevitable security gaps. Maintaining secure configurations in assets and software is essential for organizations that want to avoid potential cyberattacks or face costly audit penalties.

Securing your open source dependencies with the Snyk Visual Studio Code extension

We’re pleased to announce new functionality within the Snyk Vulnerability Scanner extension for Visual Studio Code, making it easier for developers to find and fix vulnerabilities and license issues in their open source dependencies! To help developers take more responsibility for the security of their applications, security tools must be able to integrate seamlessly into existing workflows and the tools developers are using on a day-to-day basis.

Integration of the ThreatQ platform into McAfee Enterprise infrastructure

Proper management of threat data is critical in today’s security operations and modern SOCs. The knowledge of threats, their priority in our environment, their management, and the ability to analyze them, will give us anticipatory capabilities we wouldn’t have without this management.

Cybersecurity and its impact on the home

The digital society is ever-expanding, and with that has come an ever-increasing risk of cyber attack. This is a factor coming more and more into focus, with the rate and strength of cyberattacks set to continue escalating according to one Al Jazeera report. A further risk vector is becoming apparent through the smart home - more and more people are making their home a natural extension of the digital world, and placing a lot of reliance on the web and smart tech.