APIs are quickly becoming the most popular attack vector

In this Help Net Security video, Shay Levi, CTO at Noname Security, discusses the findings from a recent API security report, which reveals a growing number of API security incidents, a concerning lack of API visibility, and a level of misplaced confidence in existing controls. Key findings include: 76% of senior security professionals experienced an […]

Continue Reading

Fine-tuning Germany’s cybersecurity strategy

Recently, Eileen Walther, Northwave’s Country Manager for Germany and specialized in information security, was elected the new Vice President of the Cyber Security Council Germany (Cyber-Sicherheitsrat Deutschland). Before joining Northwave, she was head of the Dutch High Tech Crime Team and strategic advisor at the German Federal Criminal Police Office (BKA – Bundeskriminalambt). The Cyber […]

Continue Reading

The State of Security: Poland

Poland is getting ready for the upcoming Presidential elections in August 2023 amidst a turbulent geopolitical and economic environment. The war in Ukraine has placed the country in the epicenter of the events, becoming home to more than 3.5 million refugees. The unprecedented energy crisis with prices soaring every day threaten to destabilize local economy. […]

Continue Reading

4 tips to achieve Data Compliance

Data compliance is a crucial and essential factor in organizations that should be carefully followed for data management. Data compliance is more than maintaining relevant standards and regulations and ensuring that the data is secured. The substantial amount of data that is processed and used in organizations must be managed properly. All phases of data […]

Continue Reading

This year’s biggest cyber threats

OpenText announced the Nastiest Malware of 2022, a ranking of the year’s biggest cyber threats. For the fifth year running, experts combed through the data, analysed different behaviours, and determined which malicious payloads are the nastiest. Emotet regained its place at the top, reminding the world that while affiliates may be taken down, the masterminds […]

Continue Reading

CIS Hardened Images on AWS Marketplace

Does your organization spend countless resources hardening operating systems in the cloud? That’s why CIS pre-hardens virtual machine (VM) images to CIS Benchmark standards. See how these CIS Hardened Images work by trying one in your cloud environment. Free trials are available for select CIS Hardened Images in the AWS Marketplace: Amazon Linux 2 CentOS […]

Continue Reading

Pradeo acquires Yagaan, strengthens its cybersecurity services unification strategy

Pradeo, a global leader in mobile fleet and application security enters into exclusive negotiations for the acquisition of Yagaan, an application security software company based in France. Thus, the mobile security leader is strengthening his path towards unifying cybersecurity services by providing comprehensive expertise and solutions in the fast-growing mobile security market. In 2021, the […]

Continue Reading

BigID Hotspot Reporting enables organizations to visualize their riskiest data

BigID announced Hotspot Reporting, a new feature that gives organizations the power to visualize and remediate their riskiest data. Customers can now easily visualize their data risk in a dashboard designed to surface data hotspots across all dimensions: including sensitivity, location, type of information, and more. With this new reporting capability, organizations can now: Accelerate […]

Continue Reading