There's never enough time or staff to scan code repositories. To avoid dependency confusion attacks, use automated CI/CD tools to make fixes in hard-to-manage software dependencies.
Read moreDumb Password Rules
March 2 2023Examples of dumb password rules. There are some pretty bad disasters out there. My worst experiences are with sites that have artificial complexity requirements that cause my personal password-generation systems to...
Read moreErmetic Adds Kubernetes Security to CNAPP
March 2 2023The automated capabilities can discover misconfigurations, compliance violations, and risk or excessive privileges in Kubernetes clusters.
Read moreVolume of SaaS assets and events magnifies risks associated with manual management and remediation.
Read moreNew eXtended Detection and Response Solution is 450X more efficient than typical SOCs at converting telemetry and logs into actionable alerts.
Read moreBy authenticating and authorizing every application, and by maintaining data lineage for auditing, enterprises can reduce the chances of data exfiltration.
Read moreDish Blames Ransomware Attack for Disruptions of Internal Systems, Call Center Services
March 2 2023The cyberattackers might have potentially accessed customer information, the service provider warns.
Read moreOffensive Security Is Now OffSec – Refresh Reflects Future of Cybersecurity Learning and Skills Development
March 2 2023Updated OffSec™ identity substantiates the company's commitment to expanding its cybersecurity content and resources to prepare infosec professionals for the future.
Read more
Recent Comments