Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ZeroFont trick makes users think that message has been scanned for threats

It's nothing new for cybercriminals to use sneaky HTML tricks in their attempt to infect computers or dupe unsuspecting recipients into clicking on phishing links. Spammers have been using a wide variety of tricks for years in an attempt to get their marketing messages past anti-spam filters and in front of human eyeballs. It's enough to make you wish that email clients didn't support HTML at all, and that every message had to be in plaintext email.

How Riot integrates with Vanta to increase cybersecurity awareness

Many data breaches start with a compromised account from one of a company’s employees. Jérôme Berloty and Benjamin Netter decided to build a product based on that fact and launched Riot in 2020. ‍ Based in Paris, France, Riot combines learning modules and phishing simulations to raise cyber awareness and solve compliance needs. The courses are chat-based, five minutes long, and immersive and interactive, making learning more entertaining. ‍

8 Black Kite Competitors & Alternatives: Comparison & Review

Over the past five years, digital supply chains have evolved significantly, spurred by post-pandemic corrections, technological advancements, and globalization. This evolution has made the average organization more efficient and better suited to handle the demands of their unique operation. However, these same supply chain advancements have also introduced a host of new cybersecurity concerns and dramatically expanded the attack surface of most organizations.

What is FIPS 140-2? Cryptographic Module Validation Program

FIPS 140-2 is a federal information processing standard that manages security requirements for cryptographic modules. The National Institute of Standards and Technology (NIST) published the security standard in November 2001 to develop coordinated requirements for hardware computer components. NIST replaced FIPS 140-2 with FIPS 140-3 in March 2019. This iteration introduced new critical security parameters for software and firmware and updated the four critical security levels that FIPS 140-2 introduced.

Security Awareness Is Dead. Long Live Security Awareness

Our actions determine outcomes, not our thoughts, our knowledge, or our intentions. Everyone working in cybersecurity knows that and is all too familiar with statistics like “more than 70% of cyber incidents are facilitated by human action” (in some reports, even up to 95%). Seemingly, security awareness is all about educating people about the dangers that be, but it does not cut to the chase of actually training people to do the right thing.

See Falcon Foundry in Action

With cybersecurity tool sprawl on the rise, CrowdStrike Falcon® Foundry allows you to easily build no-code applications that operate as an extension of the CrowdStrike Falcon platform, allowing your team to consolidate dozens of point products. With access to a no-code app development platform and the same CrowdStrike data and infrastructure, your team will be able to build custom apps to solve the toughest cybersecurity challenges and stop adversaries.

Veracode AI Thought Leadership Podcast

Veracode co-founder Chris Wysopal joins host Brian Roche, Chief Product Officer of Veracode, in our inaugural video podcast, The Tech Evolution. In this episode Brian and Chris discuss the impact that artificial intelligence has on software development, and even more importantly, keeping software secure using this exciting new technology.

How To Get Rid of a Computer Virus

If your computer has been infected with a virus, you need to act quickly to contain the infection. You should install antivirus software to remove any viruses from your infected device. Computer viruses can be a hassle to deal with, and they put you at risk of a security breach, identity theft and loss of your personal data. Continue reading to learn what computer viruses are, how they spread, what signs to look out for, how to get rid of them and how to prevent them.

Effective Risk Management: The COSO ERM Framework

Enterprise risk management (ERM) frameworks allow organizations to identify, assess, manage, and monitor risks across all levels of an organization. One of the most well-known approaches to ERM is the COSO ERM framework published by the Committee of Sponsoring Organizations of the Treadway Commission (COSO). The framework offers guidelines and best practices for organizations seeking to achieve a balanced perspective on risk.

Fight, Flight, or Freeze | The Human Psychology of Security

Bec McKeown explains the intricate process of how this tiny brain structure, the amygdala, sends chemical signals down the spinal cord to the adrenal gland, resulting in the production of adrenaline. Explore the intriguing phenomenon of the freeze response and how it relates to the delicate balance between heightened adrenaline and reduced rationality. Learn about the evolutionary significance of this mechanism, which once helped our ancestors escape from saber-toothed tigers but now responds to various modern threats.