A demand for real consequences: Sonatype's response to CISA's Secure by Design

A demand for real consequences: Sonatype’s response to CISA’s Secure by Design

In the fast-changing fields of cybersecurity and software development, the importance of creating secure software is more crucial than ever. Recently, my colleagues and I at the Open Source Security Foundation (OpenSSF) ...
cloud security teams, security, cloud-native, Palo Alto Dell zero trust Network Security multi-cloud zero-trustQualys multi-cloud Wi-Fi 6 access point zero-trust cloud security remote data protection

Securing Sensitive Information in Cloud Repositories

With the accelerating transition to cloud environments, securing sensitive information has emerged as a paramount concern ...
Security Boulevard
CNAPP cloud security palo alto networks Deloitte Broadcom report cloud security threat

Organizations Unprepared to Face Cloud Security Threats

The Cloud Security Alliance (CSA) State of Security Remediation report underscored the difficult balancing act cloud security experts face ...
Security Boulevard
What is Advanced Threat Protection and How to Use It in Your Business

What is Advanced Threat Protection and How to Use It in Your Business

As businesses accelerate their digital initiatives, the shadow of cybersecurity threats grows. Every advancement brings new challenges—is your Google account hacked? Are covert malware campaigns targeting your infrastructure? Amidst extensive data breaches, ...

Alert: Coyote Trojan Strike Compromises 61 Brazilian Banks

Financial cyberattacks pose a significant threat to the stability of global economies and the security of financial institutions. In a recent cybersecurity development, a staggering 61 banks in Brazil have fallen victim ...
Vector image of characters working on a computer

Data Classification Policy: Definition, Examples, & Free Template

Editor’s note: this piece was updated with fresh information in August 2021. It was originally published in November, 2020. It’s 3 AM. Do you know where your most sensitive data is? More ...

Don’t Brush Off the Toothbrush Story

| | Cybersecurity, Data breaches
The toothbrush story serves as an important reminder that IoT devices remain a sought-after hacker target. The post Don’t Brush Off the Toothbrush Story appeared first on Enzoic ...
Case Study: Sakura Internet Complies with Google DMARC Requirements via PowerDMARC

Case Study: Sakura Internet Complies with Google DMARC Requirements via PowerDMARC

| | Cybersecurity
Reading Time: 2 min Sakura Internet’s rental domain owner, Mr. Toshikazu Watanabe, achieved Google’s DMARC and email authentication compliance with PowerDMARC ...
resilience edge remote work hybrid

Techstrong Research: Navigating the Future of Security With Resilience

Techstrong Research explores what resilience and security look like for today's innovative, flexible, digital organizations ...
Security Boulevard

Volt Typhoon Malware: US Critical Infrastructure Breached

In a recent revelation, the U.S. government disclosed that the Chinese state-sponsored hacking group, Volt Typhoon has surreptitiously infiltrated critical infrastructure networks within the country for a staggering five-year period. This embedded ...