Cybersecurity
Balbix Guide to XZ Utils Backdoor
Executive Summary On March 29, 2024, developer Andres Freund reported the discovery of a backdoor in XZ Utils, affecting v5.6.0 and 5.6.1. XZ Utils, which provides compression tools for the .xz format, ...
The XZ backdoor: What security managers can learn
The post The XZ backdoor: What security managers can learn appeared first on Click Armor ...
Shadow AI: The Murky Threat to Enterprise Adoption of Generative AI
As AI continues its relentless march into enterprises, an insidious threat lurks in the shadows that could undermine its widespread adoption: Shadow AI ...
Sisense Hacked: CISA Warns Customers at Risk
A hard-coded credential catastrophe: The analytics firm kept big companies’ secrets in an insecure AWS bucket. Government says victims include the “critical infrastructure sector.” ...
Are custom security tests a product security superpower? ⎜Keshav Malik (LinkedIn)
Learn from our interview with Keshav how to better write your custom security tests and why they're necessary for your Product Security Program ...
How to secure cloud-native applications
This article is based on the Elephant in AppSec podcast episode with Mihir Shah, a Senior Staff Application Security Engineer at ForgeRock, and the author of the Cloud Native Software Security Handbook ...
The challenges and opportunities of API governance
Learn more about the concept of API sprawl, its implications, and the challenges and importance of API governance ...
Unlocking the Power of Data-Centric SAP Security: A Look at Pathlock CAC Through Kuppinger Cole’s Lens
Last month, Kuppinger Cole, a globally recognized analyst organization, took a closer look at Pathlock’s Cybersecurity Application Controls (CAC) product in a detailed Executive View report. Known for their impartial and thorough ...
Cybersecurity Insights with Contrast CISO David Lindner | 4/12/24
Insight #1 I was at the Kernelcon conference last week and heard that Gen AI is going to wreck development because there will be more vulnerabilities than ever. In the same breath, ...
Findings on Exposed Passwords in Active Directory
Password security and exposed passwords in Active Directory still matter because weak and compromised passwords lead to data breaches. The post Findings on Exposed Passwords in Active Directory appeared first on Enzoic ...