Juniper and K2 Expand Partnership for Cloud Workload Protection

Organizations have seen a dramatic shift towards digital transformation in recent years, driven in part by the COVID-19 pandemic and the work from home phenomenon.  Part of that transformation included a shift to an increased use of applications in and… Continue reading Juniper and K2 Expand Partnership for Cloud Workload Protection

Too Many Vulnerability Reports? Not Enough Real Vulnerabilities?

One of the most common issues with security testing of applications is being inundated with vulnerability reports, containing too many vulnerabilities for a typical development team to handle.  This includes reports from testing tools like SAST (Static… Continue reading Too Many Vulnerability Reports? Not Enough Real Vulnerabilities?

75% of Companies Spend as Much Time on False Positives as on Real Security Events

A new ESG report found that nearly half of all cybersecurity alerts are false positives, and 75% of companies spend an equal amount of time, or more, on them than on actual attacks. Read on to find out how to get proof of exploitability on reported at… Continue reading 75% of Companies Spend as Much Time on False Positives as on Real Security Events

Major Insurance Companies in Europe Discover That Their Applications Have Security Issues

A new article in TechTimes is highlighting the results of a study on the web application security for Insurers in Europe.  The study found that the web applications of major insurance companies in Europe contain security weaknesses.  The study looked a… Continue reading Major Insurance Companies in Europe Discover That Their Applications Have Security Issues

More Data Stolen in January 2021 than in all of 2017

ComputerWeekly reported back in May that more data records were stolen in January 2021 than in all 12 months of 2017.  878.17 million records were stolen in January, reflecting the continued increase in cyber attacks and putting 2021 to be on track to … Continue reading More Data Stolen in January 2021 than in all of 2017

New Report Finds 67% of Applications in the Utility Sector Have Serious Vulnerabilities

SiliconAngle reported on a new study that found 67% of applications in the utility sector have serious vulnerabilities.  The report found that the “Window of Exposure,” a key metric indicative of breach exposure for applications, has increased from 55%… Continue reading New Report Finds 67% of Applications in the Utility Sector Have Serious Vulnerabilities

New Executive Order on Improving the Nation’s Cybersecurity

In case you missed it, the President of the United States of America, Joe Biden, issued a new executive order in May of 2021, aimed at improving the nation’s cyber security. With increase in threats and almost daily stories of new companies being the s… Continue reading New Executive Order on Improving the Nation’s Cybersecurity

4 Ways CISOs Can Strengthen Their Security Resilience

A new article in Dark Reading discusses the “4 Ways CISOs Can Strengthen Their Security Resilience.” The article caught my attention because one of the 4 areas was to “Secure Workloads and Kubernetes Environments.” I was surprised by the inclusion of t… Continue reading 4 Ways CISOs Can Strengthen Their Security Resilience

If Your Cloud Security Is Static, You May Miss Indicators Of Attack

Forbes Magazine recently ran an article titled “If Your Cloud Security Is Static, You May Miss Indicators of Attack.”  The premise of the article, that organizations are using outdated tools to address a growing and quickly changing part of their appli… Continue reading If Your Cloud Security Is Static, You May Miss Indicators Of Attack

2021 Verizon Data Breach Investigations Report Is Out

The Verizon Data Breach Investigations report is probably one of the most widely read reports in cyber security.  Verizon released their 2021 edition of the report on May 13, 2021.
The post 2021 Verizon Data Breach Investigations Report Is Out appeared… Continue reading 2021 Verizon Data Breach Investigations Report Is Out