Security Operations (2)

July 21, 2022

Three decades later, ransomware's first act still resonates

Ransomware has taken the world by storm, with big payouts — and disruption of critical infrastructure. Here’s a look at the key factors driving the rise.
July 14, 2022

Rethink your SOC to defend against software supply chain attacks

Software supply chain attacks are on the rise, and a severe threat. Enterprises aiming to reduce risk need to rethink their SOC. Here's how to get started.
February 8, 2022

Microsoft disables Excel, Office macros by default. Will it matter?

Microsoft disabled two decades-old scripting languages in its Office products, long a favorite tool of cybercriminals. The security impact may be less than you think, however.
January 6, 2022

Here’s what happened with Log4Shell while you were out

ReversingLabs assists companies in mitigating software supply chain attacks and vulnerabilities like Log4Shell
December 13, 2021

Get smart: Leverage threat intel to detect ransomware

Operationalizing high fidelity threat intelligence can help your organization short circuit emerging ransomware attacks. Here’s how
September 20, 2021

Expanding Security Visibility To Reduce Software Supply Chain Risk

No doubt about it, the way malicious actors attack their targets through software is changing
July 7, 2021

Third-party code comes with some baggage

Recognizing risks introduced by statically linked third-party libraries
January 11, 2021

CISO’s Guide to Protecting Against Modern Software Risks

How to Rebuild Trust in the SDLC and 3rd Party Software Supply Chain