Advertisement

noops code developer devops html web developer by mazimusnd getty

Codenotary adds vulnerability scanning to its repertoire

With new addition, company's cloud solution boasts end-to-end protection of software supply chain.


Insider threats  >  Employees suspiciously peering over cubicle walls

MITRE and partners build insider threat knowledge base

MITRE Engenuity and major business partners have developed an knowledge base of malicious insiders' tactics, techniques and procedures.


big data merger and acquisition big business smb

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.


Advertisement

wind turbines energy utilities innovation alternative energy by anna jimenez calaf unsplash

Fortress creates center for security information on energy suppliers

Vendor library offers means to bolster supply-chain security through data sharing and communication.


sucessfully transitioning to devsecops

Deepfence revamps ThreatMapper with new scanner, runtime SBOMs

The latest version of open-source ThreatMapper includes a secret scanner to observe and report sensitive information left inadvertently in production environments, and the ability to generate runtime SBOMs to map and observe key...


A U.S. dollar sign materializes from small, separate blocks into a unified whole.

SEC filings show hidden ransomware costs and losses

A review of 2021 8-K filings with the U.S. Securities and Exchange Commission reveals a more complete picture of the financial damage from ransomware.


Encryption  >  A conceptual technological lock and encrypted code.

Preparing for the quantum-safe encryption future

Organizations soon need to transition to quantum-safe encryption to address new cybersecurity threats. Here’s how businesses can prepare.


csea22 003 32 image

CSO Executive Sessions / ASEAN: Christopher Lek on a career in cybersecurity

Christopher Lek, Director at Nanyang Technological University, joins Xiou Ann Lim for this CSO Executive Sessions interview.


abstract circuitry with padlock for security

What is SIEM? Security information and event management explained

SIEM software collects and aggregates log and event data to help identify and track breaches. It is a powerful tool for security insights.


EU / European Union / GDPR data privacy, regulation, compliance

Meta fined €17 million by Irish regulator for GDPR violations

In the wake of 12 data breaches reported in 2018, Facebook’s parent company hit with hefty fine for failing to follow GDPR regulations related to its ability to demonstrate data privacy protection practices.


Advertisement

Ransomware

New ransomware LokiLocker bundles destructive wiping component

LokiLocker also uses an unusual obfuscation technique to avoid detection.


incoming emails / DNS security / locked server / parked domain

Cloudflare unveils email security tools, free WAF ruleset, and API gateway

Cloudflare has announced a slew of new products, including a suite of email security tools for phishing and malware detection, a free WAF ruleset and a machine-learning powered API gateway.


Binary Russian flag

Germany's BSI warns against Kaspersky AV over spying concerns

The warning renews global concerns about using Russian-made software as the country continues its assault on Ukraine.


Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Preparing Microsoft cloud networks for regional disruptions

The Ukrainian crisis shows has heightened awareness of risks to cloud infrastructure affected by political or natural disasters.


wordpress

Top tools and best practices for WordPress security

Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out.