A new report from Adaptive Shield looks at the how volume of applications being connected to the SaaS stack and the risk they represent to company data.
Read moreResearchers exploited issues in the authentication protocol to force an open redirection from the popular hotel reservations site when users used Facebook to log in to accounts.
Read moreIt's 10 p.m. Do you know what your children are playing? In the age of remote work, hackers are actively targeting kids, with implications for enterprises.
Read moreRogue software packages. Rogue "sysadmins". Rogue keyloggers. Rogue authenticators. Rogue ROGUES!
Read moreThere's never enough time or staff to scan code repositories. To avoid dependency confusion attacks, use automated CI/CD tools to make fixes in hard-to-manage software dependencies.
Read moreDumb Password Rules
March 2 2023Examples of dumb password rules. There are some pretty bad disasters out there. My worst experiences are with sites that have artificial complexity requirements that cause my personal password-generation systems to...
Read moreErmetic Adds Kubernetes Security to CNAPP
March 2 2023The automated capabilities can discover misconfigurations, compliance violations, and risk or excessive privileges in Kubernetes clusters.
Read moreVolume of SaaS assets and events magnifies risks associated with manual management and remediation.
Read moreBy authenticating and authorizing every application, and by maintaining data lineage for auditing, enterprises can reduce the chances of data exfiltration.
Read more
Recent Comments