9 min read
    0

    Insider Threats Demystified: Enhancing Security with ITDR and…

    Understanding Insider Threats Insider threats encompass a spectrum that includes both direct insiders with malicious or negligent intentions and compromised insiders manipulated by external forces. Within the landscape of an organization, these threa...
    by   in Cybersecurity
    5 min read
    1

    Growing Concern Over API Security

    The dialogue around application and service security often misses a critical component: the interface. Application Programmable Interfaces (APIs), the threads that weave through cloud applications and services, are prone to becoming significant vulne...
    by   in Cybersecurity
    10 min read
    1

    Navigating PCI DSS 4.0

    In today’s digital age, the security of payment systems isn't just a feature—it's foundational to maintaining the integrity and trust in our financial ecosystem. As transactions increasingly move online, the potential for cyber threats gr...
    by   in Cybersecurity
    7 min read
    0

    Navigating the Aftermath: The Change Healthcare Cyberattack

    The cybersecurity terrain within healthcare was abruptly upended by the cyberattack on Change Healthcare, marking a pivotal moment for the sector's digital defenses. This incident illuminated the stark vulnerabilities within our healthcare systems, s...
    by   in Cybersecurity
    6 min read
    0

    Beyond the Noise: Elevating SAST with Fortify's Precision and…

    When approaching the domain of application security, particularly through the lens of Static Application Security Testing (SAST), one critical concern that frequently arises pertains to the initial analysis phase with tools like Fortify SAST. The pro...
    by   in Cybersecurity
    3 min read
    0

    Fortify + Sonatype for AppSec: What customers are saying

    Based on a PeerSpot PeerPaper About Sonatype Lifecycle and OpenText Fortify Static Code Analyzer While the use of open-source software (OSS) has become non-negotiable in software development today, the practice has not been a risk-free proposition. T...
    by   in Cybersecurity
    3 min read
    1

    The State of Passwordless Authentication – 2023 Edition

    Some may remember the blog I did last summer on the State of Zero Trust. In that blog I reviewed the evolution of breaches as tracked by Verizon’s annual DBIR report. As usual, the key takeaway from that report was that compromised credentials ...
    by   in Cybersecurity
    2 min read
    0

    How to Achieve Efficient Governance with Identity and Data P…

    Managing identities and access rights across the networks, systems, and resources of your organization poses a continuous challenge, impacting IT departments, security teams, and business owners. This challenge becomes even more complex with new tech...
    by   in Cybersecurity
    4 min read
    1

    Mastering the Art of Threat Hunting with XDR: A Comprehensive…

    In the ever-evolving landscape of cybersecurity, organizations face an escalating battle against sophisticated cyber threats. To fortify their defences, many are turning to advanced technologies like Extended Detection and Response (XDR). This in-dep...
    by   in Cybersecurity
    3 min read
    0

    Navigating NIS 2: Strengthening Cybersecurity Across the EU

    In an era marked by escalating cyber threats, the European Union (EU) has taken a decisive step forward with the Network and Information Systems (NIS) 2 Directive. This legislation, building upon the foundations laid by the 2016 NIS Directive, is des...
    by   in Cybersecurity