Report Finds Software Supply Chains Rife with Vulnerabilities

A report published today by application security testing tool provider GrammaTech in collaboration with Osterman Research suggests just about every software supply chain is rife with vulnerabilities. An analysis of commercial off-the-shelf (COTS) appl… Continue reading Report Finds Software Supply Chains Rife with Vulnerabilities

Review: Group-IB Digital Risk Protection

The COVID-19 pandemic has transformed our private and working lives. It has also forced companies to extend the network perimeter due to employees working from their homes and to accelerate digital transformation efforts across the board. The latter pu… Continue reading Review: Group-IB Digital Risk Protection

Italian Vaccine Sites Shut Down by Ransomware Thugs

Some Italian healthcare websites and their backroom systems have been wiped off the internet by malware.
The post Italian Vaccine Sites Shut Down by Ransomware Thugs appeared first on Security Boulevard.
Continue reading Italian Vaccine Sites Shut Down by Ransomware Thugs

How SASE Enables Zero-Trust

On this episode of The View With Vizard, Mike Vizard talks with Kelly Ahuja, CEO of Versa Networks about their latest $84 million funding round and the ways SASE enables zero-trust. The video is below followed by a transcript of the conversation. Anno… Continue reading How SASE Enables Zero-Trust

Developing Best Practices for API Security

APIs are pivotal to the overall success of a digital transformation. They allow developers to work across the digital assets and across multiple systems with ease. More organizations are adopting API initiatives, and are approaching digital transforma… Continue reading Developing Best Practices for API Security

Data Laundering Poses Privacy, Security Risks

Data laundering, like money laundering, is the act of acquiring data through an illegal means—whether that’s the dark web or a hacked/stolen database—and then taking that data and running it through a legitimate business or process in order to make th… Continue reading Data Laundering Poses Privacy, Security Risks

Cybersecurity Lessons from the Pandemic: Why Not

You might notice there’s no question mark at the end of the title. That is intentional. In a May 18, 2021 Opinion article in The New York Times by Dr. Sema K. Sgaier, with the title: “Meet Four Kinds of People Holding Us Back from Full Vaccination,” wh… Continue reading Cybersecurity Lessons from the Pandemic: Why Not

Ransomware Attacks Leave Lasting Damage

Organizations hit by ransomware attacks also report tightened budgets and lingering impacts on productivity, profitability and security posture, suggesting the extensive damage caused in the wake of ransomware attacks has long-lasting effects. A Keepe… Continue reading Ransomware Attacks Leave Lasting Damage

U.S., UK and Australia Issue Joint Cybersecurity Advisory

As vulnerabilities are discovered, advisories are issued, remedies and mitigations are shared and then the onus is on the end user and/or company to do what’s necessary to close the window into their infrastructure. That is what happens in a per… Continue reading U.S., UK and Australia Issue Joint Cybersecurity Advisory

A look at the 2021 CWE Top 25 most dangerous software weaknesses

The 2021 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses is a demonstrative list of the most common issues experienced over the previous two calendar years. These weaknesses are risky because they are many times easy to find… Continue reading A look at the 2021 CWE Top 25 most dangerous software weaknesses