April 8, 2022
The resurgence of the Conti ransomware group is a sign of changes afoot in the global ransomware underground—and more trouble ahead for enterprises.
March 14, 2022
On one side you have your SIEM investment – connecting multiple security event sources, correlating source information and creating events on anything that looks threatening. On the other side you have your response process, often home built, or maybe you have invested in one of the new SOAR tools.
February 10, 2022
The U.S. Government’s standards body issued guidelines for secure software development, with a call for close monitoring of federal software supply chains including analysis of compiled binaries
December 15, 2021
The vulnerability is the most serious and widespread ever. It’s also an object lesson for why software publishers and their customers should embrace software bills of materials (SBoMs)
December 13, 2021
Operationalizing high fidelity threat intelligence can help your organization short circuit emerging ransomware attacks. Here’s how
September 20, 2021
No doubt about it, the way malicious actors attack their targets through software is changing