WhiteSource has renamed itself Mend as the company pushes beyond software composition analysis to become a broad application security platform with automated remediation. The name WhiteSource didn't have any negative connotations when the company was founded, but some people today find it offensive.
The ICO has imposed a penalty of 7.5 million pounds on Clearview AI Inc. for using scraped U.K. citizen facial images for its facial recognition database. The agency has directed the firm to delete images of all U.K. citizens and to stop scraping data from the open internet.
As attack surfaces have grown, so has risk - and adversaries are finding new ways to infiltrate organizations. Wade Ellery of Radiant Logic discusses the convergence of risk, identity management and zero trust security, spelling out new strategies to defend attack surfaces and minimize risk.
New CEO Bryan Ware plans to leverage LookingGlass' nascent attack surface management capabilities to capture clients in verticals such as pharmaceuticals, manufacturing and utilities. The company tapped former CISA leader Ware to serve as its next CEO following the acquisition of Next5.
Many organizations are unable to accurately identify their rapidly changing attack surface. Attack surface management (ASM) solutions aim to address this challenge. This analyst report assesses the landscape of ASM solutions and how well each is positioned to serve small, mid-market and large enterprises.
Dive into...
Tenable has agreed to purchase startup Bit Discovery for $44.5 million to help companies discover, attribute and monitor assets on the internet. The deal will allow Tenable to identify vulnerable internet-facing assets that could be attacked.
Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of credentials.
In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are
escalated to gain access to more privileged accounts — the keys to the...
In this time of heightened consumer expectations, the financial services industry continues to be one of the top targets for cyberattacks. To develop hyper-personalized experiences, financial institutions are engaging with more third-party partners (e.g., traditional competitors, fintech, Big Tech) to share data and...
Researchers at security firm ESET have found three vulnerabilities affecting Lenovo laptops worldwide and targeting users who work from home. Two of the flaws affect UEFI firmware drivers meant for use only during the manufacturing process of Lenovo notebooks, and one is a memory corruption bug.
A week after Microsoft announced the Windows Autopatch feature and declared that, come July, the tradition of Patch Tuesday will end, it's Patch Tuesday again, and the company has issued more than 100 security fixes for software that resolve critical issues, including two zero-day vulnerabilities.
Attack Surface Management (ASM) fills in the gaps of current threat detection solutions. Your attack surface refers to all of the assets that store your data – from hardware to software – that are accessible from the internet. In this 101 guide, we cover how an ASM solution provides comprehensive, real-time...
Shadow IT has become a significant risk to organizations worldwide. The increase of people working remotely due to the pandemic has led to the use of critical cloud-based applications without the knowledge or approval of enterprise IT teams which poses potential security, compliance, productivity issues and high...
Dragos's annual ICS/OT Cybersecurity Year in Review Report provides in depth analysis of ICS vulnerabilities, global threat activity targeting industrial environments, and industry trends and observations gathered from customer engagements worldwide.
Download this fifth annual report for insights driven from data...
Digital transformation is led by applications which eventually decide your cloud strategy & most of the time these applications end-up running in siloed multiple clouds governed by technical and cost reasons. With growth in application portfolio across Hybrid, Multi-cloud, organizations are under tremendous pressure...
Digital transformation is led by applications which eventually decide your cloud strategy & most of the time these applications end-up running in siloed multiple clouds governed by technical and cost reasons. With growth in application portfolio across Hybrid, Multi-cloud, organizations are under tremendous pressure...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.