Product showcase: ImmuniWeb Neuron, DAST with a zero false positives SLA

Few organizations can afford regular penetration testing of their numerous web applications, APIs and microservices. Instead, they usually leverage a fully automated web vulnerability scanning, namely various Dynamic Application Security Testing (DAST)… Continue reading Product showcase: ImmuniWeb Neuron, DAST with a zero false positives SLA

CISA and NPower offer free entry-level cybersecurity training

NPower, a US-based non-profit participating in a cybersecurity workforce development program started by the Cybersecurity and Infrastructure Agency (CISA), is looking for recruits for a free cybersecurity training program aimed at underserved populatio… Continue reading CISA and NPower offer free entry-level cybersecurity training

Attackers are using deepfakes to snag remote IT jobs

Malicious individuals are using stolen personally identifiable information (PII) and voice and video deepfakes to try to land remote IT, programming, database and software-related jobs, the FBI has warned last week. The increasing malicious use of deep… Continue reading Attackers are using deepfakes to snag remote IT jobs

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

The risks presented by ransomware and cyber extortion events have likely found a place in your own security team’s discussions, and rightfully so. Ransomware attacks have proliferated in the last decade. The numbers are staggering if not overwhelming, … Continue reading Detection, isolation, and negotiation: Improving your ransomware preparedness and response

(IN)SECURE Magazine: RSAC 2022 special issue released

RSA Conference concluded its 31st annual event at the Moscone Center in San Francisco on Friday, June 10. Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and… Continue reading (IN)SECURE Magazine: RSAC 2022 special issue released

The Intigriti Ethical Hacker Survey 2022

The Intigriti Ethical Hacker Survey 2022 is now available, highlighting how ethical hacking continues to grow as a popular career choice for all levels of security experts. For the second year running, Intigriti has gone into the field and spoken to a … Continue reading The Intigriti Ethical Hacker Survey 2022

Download guide: Evaluating third-party security platforms

A comprehensive third-party security program can align your vendor’s security with your internal security controls and risk appetite. Such a program can also help you remediate risk if your vendors fall short. And the right third-party security managem… Continue reading Download guide: Evaluating third-party security platforms