Featured
How CISOs Can Influence API Security Change
Security incidents can cost a chief information security officer (CISO) their job. For example, cybersecurity breaches at Capital One, Uber, Equifax and plenty of others have led to the firing or forced ...
Don’t Trust the Security of the Software Supply Chain
Now more than ever, organizations are relying on the supply chain for basic business operations. According to Charlie Jones, director of product management with ReversingLabs, there are two reasons for this: The ...
Orca Security Traces Cloud Vulnerabilities Back to Code
Orca Security today announced it added an ability to trace cloud security risks in production environments back to both the original code that created the issue and the developer that wrote it ...
TikTok Abused Kids’ Data — UK Fines it $16 Million
$8.50 per child: UK regulator punishes TikTok at 5.5% of revenue. Says app illegally tracked children ...
Splunk: Cybersecurity Dynamics Rapidly Changing
A survey of 1,520 cybersecurity and IT leaders published today found more than half (52%) reporting their organization suffered a data breach in the past two years, with 62% experiencing monthly unplanned ...
Sysdig Details Proxyjacking Attack Leveraging Log4j Vulnerability
Sysdig today published a report that described how cybercriminals are exploiting the Log4j vulnerability to gain access to IP addresses that are then sold to entities that resell them. Dubbed proxyjacking, the ...
White House Moves to Address Software Supply Chain Security
No one wants a repeat of the SUNBURST cyberattack, but without any action to improve cybersecurity within the software supply chain, another SUNBURST—or worse—attack is inevitable. And we still may see a ...
Making SaaS Compliance Easy with Automated Report Generation
Compliance is hard. It’s an arduous, manual, cost-prohibitive process that often takes months, if not years, to achieve for organizations in financial services, insurance, healthcare, and other highly regulated industries. Today, we ...
Navigating SaaS Posture Management in an Era of Evolving Regulatory Compliance
Yesterday, Obsidian announced the next-generation of our SaaS Security Posture Management (SSPM) solution that delivers increased customizability, extended breadth to increase the security posture across all applications in their ecosystem (not just ...
NTT Taps Microsoft to Provide MDR Service
NTT Ltd has launched a managed detection and response (MDR) security service based on Microsoft Sentinel, a security information event management (SIEM) platform hosted in the Azure cloud service. The NTT MDR ...