Source
DARKReading
If security leaders focus on visibility and metrics, they can demonstrate their programs' value to company leadership and boards.
Acquisition will add Internet-facing attack surface mapping and monitoring to Tenable's internal asset management products.
The move to IaC has its challenges but done right can fundamentally improve an organization's overall security posture.
Lord previously spearheaded security for the Democratic National Committee and held leadership roles at companies including Yahoo, Rapid7, and Twitter.
With Web application programming interface (API) traffic growing quickly, the average cloud-focused company sees three times more attacks.
The FBI warns that ransomware targets are no longer predictably the biggest, richest organizations, and that attackers have leveled up to victimize organizations of all sizes.
Apostro's system will monitor all transactions to identify malicious behavior that can cause damage to DeFi protocols.
SecurityScorecard's Cyber Risk Quantification portfolio helps customers understand the financial impact of a cyber-attack.
This Tech Tip reminds developers and security teams to check what version of Java they are running. Whether they are vulnerable to the ECDSA flaw boils down to the version number.
Threat actor is using the flaw to deliver Core Impact backdoor on vulnerable systems, security vendor says.