NTT Application Security released its six-month trend findings in its AppSec Stats Flash Vol. 7, reporting on the current state of application security and the wider threat landscape, including Window of Exposure (WoE), Vulnerability by Class, and Time to Fix.
WhiteHat Security released AppSec Stats Flash Vol. 4, the latest installment of the company's monthly report and podcast reflecting on the current state of application security and the wider cyber threat landscape.
WhiteHat Security released AppSec Stats Flash Volume 3, the latest installment of the company’s monthly report and podcast reflecting on the current state of application security and the wider cyber threat landscape.
The Department of Homeland Security will allocate $1.8 billion in grants to state and local jurisdictions to protect against terrorism and other disasters, with at least $77 million specifically going toward combatting domestic violent extremism.
What are the consequences to the organization, to the cities they reside in, to workplace efficiency and, of course, to the evolving security landscape? The answers are unknown, but the opportunities are plentiful.
With so many working from home, the cyber hygiene of employee homes has become a more central concern to those overseeing security inside today’s enterprises. The bottom line for every organization is that its attack surface has greatly expanded, altering traditional cybersecurity roles. Security within the enterprise needs to reshape to fit this new reality.
The CoVID-19 pandemic is a gold-mine for lessons learned when it comes to security and cybersecurity at the enterprise level. Listen to Chris Jacquet, CISO at Hatachi Vantara, talk about the lessons he’s learned to keep his enterprise safer.
The Q3 2020 Threat Landscape Report by Nuspire demonstrates threat actors becoming even more ruthless. Throughout Q3, hackers shifted focus from home networks to overburdened public entities, including the education sector and the Election Assistance Commission (EAC). Malware campaigns, like Emotet, utilized these events as phishing lure themes to assist in delivery.
Building security and privacy into product development is more critical today than ever before. First introduced through the Microsoft Trustworthy Computing initiative in the early 2000s, the well-known security development lifecycle (SDL) is a framework designed to do just that. It was originally devised to enhance software security, but an SDL process can and should be applied to all types of products to help root out security and privacy vulnerabilities, while establishing long-term resilience in the rapidly evolving threat landscape.