Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Zero Standing Privileges (ZSP)? definition, benefits, and how to achieve it

Zero Standing Privileges (ZSP) is a security model that eliminates always-on privileged access. No user, workload, or system retains persistent elevated permissions. Privileged access is granted only when required, for a limited time and specific scope, and is automatically revoked after use. ZSP reduces attack surface, limits lateral movement, aligns with Zero Trust, and simplifies audits and compliance.

Tessian partners with Optiv Security as part of the company's move to a 100% channel model

Human Layer Security company Tessian today announces that it is moving to a 100% channel model, partnering with leading cybersecurity partners like Optiv Security to help enterprises secure the human layer and protect against threats caused by human error.

Web application security - 2021 update

Now more than ever it is critical for businesses to be successful during the pandemic with online sales. However, this is also where we often find cybercriminals are most successful. Internet security can be complex and is continuously being forced to change and stay up to date, with new cyber threats that come to light each day. However, one big threat that is typically overlooked is web application security. How important is web application security you ask?

Changing eKYC regulations: Are FI's ready to make a headway?

India ranks as one of the top two countries in the world in terms of digital adoption as per a McKinsey report. Over the last few years, initiatives such as Aadhaar, the national biometric digital identity program, have included over a billion Indians. India has also pioneered the United Payments Interface (UPI), a singular platform available as a mobile app that allows instant and cost-effective money transfer across people and businesses.

Snyk Container meets Cloud Native Buildpacks: Cloud Native Application Security the right way

So you’re running microservices in containers? Congratulations! This is an important step towards meeting those business needs around delivering applications to the hands of your customers as soon as possible. But how can we mitigate any potential risks associated with faster software deployment? Simple, with Snyk.

Anatomy of a Supply Chain Attack: How to Accelerate Incident Response and Threat Hunting

In recent months, we’ve seen a sharp rise in software supply chain attacks that infect legitimate applications to distribute malware to users. SolarWinds, Codecov and Kesaya have all been victims of such attacks that went on to impact thousands of downstream businesses around the globe. Within minutes of these high-profile attacks making headline news, CEOs often ask: “Should we be concerned? How is it impacting us? What can we do to mitigate risk?” .

SQL Injection explained in 1 minute

SQL injection, also known as SQLi, is one of the most dangerous vulnerabilities for online applications. It's a common method used by attackers to manipulate and access database information that would otherwise not be displayed or provided to the website user. In this video, you'll learn what SQL injection is and why you should be aware of it.

Cyber Defenders Defending Critical Infrastructure Interview with Aaron Cockerill

Nextgov interview with Aaron Cockerill for a conversation shaped by today’s topics of critical infrastructure and cybersecurity threats. Discussing everything from phishing attacks to hybrid-remote work best practices, this interview offers insight into how Lookout can help both public and private organizations address digital threat prevention, providing relevant context to the cybersecurity world going forward.