Seven API Security Predictions for 2022
If 2022 is anything like 2021, we’ll see no shortage of API-related events this coming year. In 2021, we saw many issues originating from leaky APIs, misconfigurations, weak or broken access controls, ...
Detecting Log4j (Log4Shell): Mitigating the impact on your organization
The discovery of Log4j has DevOps teams working tirelessly to mitigate the issue. Here are six actions your organization should be taking now. The post Detecting Log4j (Log4Shell): Mitigating the impact on ...
How to cyber security: Software supply chain risk management
Effective software supply chain risk management requires security measures throughout the entire supply chain. The post How to cyber security: Software supply chain risk management appeared first on Software Integrity Blog ...
Cisco Survey Surfaces Legacy Infrastructure Security Challenges
A global survey of 5,123 active IT, security and privacy professionals conducted by YouGov on behalf of Cisco found well over a third of organizations (39%) are relying on what they consider ...
Microsoft Defender for Endpoint on AWS: Part 2
In the first entry in this series, we explored what Endpoint Detection and Response (EDR) is, and why the Lightspin Office of the CISO uses it to secure our Amazon EC2 server estate ...
How to Proactively Remove File-Based Malware
There’s no question that the past 18 months have been challenging for technology and cybersecurity leaders. Cyberthreats have skyrocketed at a time when companies have been enabling hybrid workforce models and transforming ...