Making the Case for Supply Chain Behavior Transparency

The Biden Administration’s Cyber Executive Order includes a Software Bill of Materials (SBOM), an electronically readable format designed to provide an inventory of third-party components that make up software components.  It is a critical and necessa… Continue reading Making the Case for Supply Chain Behavior Transparency

How to Prevent Breaches by Protecting Your Attack Surface

Preventing breaches begins with understanding and protecting your attack surface. For most enterprises, their attack surface is huge. To help wrangle it, security professionals have struggled for years to use tools such as network mapper (nmap) or vul… Continue reading How to Prevent Breaches by Protecting Your Attack Surface

DealHub raises $20M Series B for its sales platform

DealHub.io, an Austin-based platform that helps businesses manage the entire process of their sales engagements, today announced that it has raised a $20 million Series B funding round. The round was led by Israel Growth Partners, with participation from existing investor Cornerstone Venture Partners. This brings DealHub’s total funding to $24.5 million. The company describes […] Continue reading DealHub raises $20M Series B for its sales platform

Research Roundup: Micro Analysis To Macro Implications In Digital Forensics

Our brief roundup this month looks at seven recent papers, which look at improving malware detection and acquisition, analyzing instant messaging apps and the Zoom platform, the future of digital forensics tools and practice, and finally, a framework f… Continue reading Research Roundup: Micro Analysis To Macro Implications In Digital Forensics

Digital Forensics Standards In Q1 2021

The items in our roundup this spring build on many of the updates from our January roundup, including new drafts available for public comment and additional work on standardization projects in the United Kingdom and European Union.

Additionally, a d… Continue reading Digital Forensics Standards In Q1 2021

Delivering on the Promise of Application Security in the Cloud

Application security has become a complex, distributed problem.  During the days of waterfall development and monolithic applications, application security was pretty straight forward – statically scan your source code, dynamically test your business … Continue reading Delivering on the Promise of Application Security in the Cloud

How Cloud Defenders Thwart Attacks Against Resilient Services

The introduction of containers and micro-service architectures have changed the way we develop, deploy, and run our applications.  Not only has this changed application development, but it’s also created some visibility challenges for application secu… Continue reading How Cloud Defenders Thwart Attacks Against Resilient Services