Introducing the new Application Owner Alerts Workflow Tool!

Introducing the new Application Owner Alerts Workflow Tool!

One of the biggest challenges we face while helping our customers mitigate third-party risks, is that not all incidents are clear cut, as in not everything is “good vs. evil”. Some vendors ...
Sign Up for Our Newsletter

Jack Henry partners up with NFACU winner NuData to help banks and credit unions fight fraud

| | Blog
Jack Henry and NuData Security have partnered to enhance the Banno platform, providing financial institutions with behavioral security without […] The post Jack Henry partners up with NFACU winner NuData to help ...
M00nD3v, HawkEye threat actor, sells malware after COVID-19 diagnosis

M00nD3v, HawkEye threat actor, sells malware after COVID-19 diagnosis

Key Points The information-stealing malware dubbed M00nD3v Logger was recently auctioned off on Hack Forums, together with HakwEye Reborn. The threat actor – operating under the alias “M00nD3v” – states that they ...
Insider Threats are on the Rise

Insider Threats are on the Rise

Insider threats are on the rise. The global pandemic has seen an exponential growth of... The post Insider Threats are on the Rise appeared first on Gurucul ...

Bidpath Leads by Example and Avoids These 4 Security Pitfalls

There’s no debate. Application security is a must. However, delivering vulnerability-free software at speed and scale… The post Bidpath Leads by Example and Avoids These 4 Security Pitfalls appeared first on ZeroNorth ...
Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA

Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA

Traditional security vendors offering solutions like SIEM (Security Information and Event Management) are overpromising on analytics while also requiring massive spend on basic log storage, incremental analytics, maintenance costs, and supporting resources ...

Securing devices for a challenge of a lifetime

| | Blog
In light of the current global situation, technology is replacing a number of real-life activities to help us through the unprecedented measures that have been put in place in response to the ...
Virsec Overview: Protecting Against Advanced Cyberattacks

Most Employees Would Enjoy Working from Home (WFH) Long Term, But Aren’t Fans of Invasive Monitoring Software

| | Blog, Security News
Living through a pandemic is fraught with difficulty, but one thing is clear. For people fortunate enough to have the option of working from home, that is something they do like, at ...
Week Three Featuring Research From Forrester:  How to Make Open Source Software Work For You

Week Three Featuring Research From Forrester: How to Make Open Source Software Work For You

Open source software (OSS) continues to grow in popularity and remains a key part of application development. The advantages… The post Week Three Featuring Research From Forrester: How to Make Open Source ...