Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Strange Bedfellows: Software, Security and the Law

The ongoing rise in cyberattacks across the software supply chain and a shifting regulatory landscape are forging an unlikely alliance between CISOs, software leaders and legal experts. Privacy, the shifting and diverse regulatory landscape, liability and new AI/ML use cases all present unique challenges and opportunities for risk management, but to best navigate these challenges, legal teams must be involved, too. Why? Because today, software vulnerabilities can represent not just a business risk but a legal risk.

Two Birds, One Stone: Shrinking Security Debt and Attack Surfaces

Cybersecurity teams and developers continually struggle to reconcile what can seem like two competing priorities. Delivering new capabilities and addressing existing security technical debt. But what if they can do both at the same time? Forward-leaning AppSec programs are finding smart ways to reduce security debt by instituting a strategic approach to managing security vulnerabilities. This approach starts by reducing the attack surface early on and throughout development.

Malicious Package Trend Analysis

It might seem obvious that regularly upgrading software and dependencies means your software is inherently more secure, but in practice, this is hard to achieve. Choice Hotels struggled to manually maintain their codebase and remediate all the transitive vulnerabilities lurking in the code. Today’s compositional applications created a complex archeological exploration challenge for developers trying to resolve security issues across a codebase. It was time-consuming, tedious, and imperfect.

Key to selling tickets on your website

Organization of events always presumes much effort, and one of the most important aspects of the whole process is selling tickets. Easy to use CRM systems simplify most tasks associated with ticket management and sales on the website of the event organizer. Let us review the way such software functions using online ticket sales software, an easy and intuitive ticket sales service as an example.

Weekly Cybersecurity Recap July 21

It's been a few months since the MOVEit data breach occurred, and more than 130 companies have been reported as being hit and exposed by the connected attacks. It's clear that there will be no immediate end to these attacks, and three of the five attacks we're reporting this week are all connected to MOVEit file services. Government services, investment companies, public universities, and healthcare services were all hit this week.

GuidePoint Security Breached in MOVEit Data Attacks: Customers Get Exposed

GuidePoint Security is a software company that specializes in security services. The organization is located in Herndon, Virginia, employs 722 people, and protects and manages data for thousands of people during its daily operations. This company was compromised in the MOVEit data breaches, putting a large number of people at risk.

Surviving Cybercrime Crisis: The Hidden Human Cost and Emotional Toll

We delve into the untold realities of cybercrime crisis management. Senior team members vanishing for days due to burnout, the forgotten importance of eating and sleeping, and the rising emotional stakes. Join us to uncover the human side of incidents and the challenges faced during firefighting. GUEST BIOS Joe Hancock.