Search results: security vulnerabilities of SaaS services

What Is Application Security Posture Management (ASPM)?

Intro to Application Security Posture Management (ASPM) Given the pace of digital transformation and the complexity of modern applications, the way developers build and deliver software has changed. Software is now shipped ...
Rust Won’t Save Us: An Analysis of 2023’s Known Exploited Vulnerabilities

Rust Won’t Save Us: An Analysis of 2023’s Known Exploited Vulnerabilities

| | Attack Blogs
Introduction Memory safety issues have plagued the software industry for decades. The Cybersecurity & Infrastructure Security Agency (CISA) has been leading a charge for secure-by-design and encouraging developers and vendors […] The ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Supply Chain Security and NIS2: What You Need to Know." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Supply Chain Security and NIS2: What You Need to Know

| | Blog, CTI Strategies
The Network Information Systems Directive (NIS2) and its predecessor NIS focus on risk management for organizations. The EU states that the NIS is the first piece of EU-wide legislation on cybersecurity with ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Supply Chain Security and NIS2: What You Need to Know." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Supply Chain Security and NIS2: What You Need to Know

| | Blog, CTI Strategies
The Network Information Systems Directive (NIS2) and its predecessor NIS focus on risk management for organizations. The EU states that the NIS is the first piece of EU-wide legislation on cybersecurity with ...
What is SOC 2 with Wesley van Zyl

The Ultimate SOC 2 Checklist for SaaS Companies 

Here’s a handy SOC 2 compliance checklist to help you prepare for your SOC 2 compliance audit and realize your business’ security goals. The post The Ultimate SOC 2 Checklist for SaaS ...
News alert: Aembit, Crowdstrike partner to help companies tighten security of IAM workload access

News alert: Aembit, Crowdstrike partner to help companies tighten security of IAM workload access

| | Steps forward, Top Stories
Silver Spring, Maryland, Jan. 30, 2024 — Aembit, the Workload Identity and Access Management (IAM) platform that enables DevOps and security teams to discover, manage, enforce and audit access between workloads, today ...

Python FBot Hacking: Cloud and SaaS Platforms Targeted

In the ever-evolving landscape of cybersecurity, a recent revelation has come to light – the emergence of a new Python-based hacking tool. Malicious activities initiated using the tool are being dubbed FBot ...

How to Recover After Failing a Cybersecurity Audit

The post How to Recover After Failing a Cybersecurity Audit appeared first on Digital Defense ...
supply chain, SBOM, cybersecurity, SLSA organizations third party attacks supply chain supply chain ransomware The Kill Chain Model

The Role of XBOMs in Supporting Cybersecurity

SBOMs aren’t the only bills of materials that are necessary for the protection of your tech stack. XBOMs are growing in importance ...
Security Boulevard

NSA Top Ten Cybersecurity Misconfigurations: An Active Directory Perspective

Late last year, the United States National Security Agency’s (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) released a list of the most common vulnerabilities in large computer networks. This... The post ...