Top 10 free MITRE ATT&CK tools and resources

MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK is open and available to any person or organization for use at no... Read more »

The evolution of DevSecOps

73% of IT decision-makers admit more could be done to improve their DevSecOps practices, with many organizations behind in their goals, according to a survey conducted by Insight Avenue.... Read more »

How companies time data leak disclosures

Every year the personal data of millions of people, such as passwords, credit card details, or health details, fall into the hands of unauthorized persons through hacking or data... Read more »

Sherweb partners with Malwarebytes to offer endpoint security for MSPs

Sherweb has announced the addition of Malwarebytes to its cloud solutions portfolio. Malwarebytes provides advanced endpoint protection in an evolving threat landscape. It can be used to provide protection... Read more »

NAVEX One COI Disclosures addresses conflicts of interest outside of annual campaigns

NAVEX launches NAVEX One COI Disclosures, enabling organizations to receive and address conflicts of interest (COI) matters outside of annual campaigns, empowering them to respond to ongoing disclosures and... Read more »

Week in review: Log4Shell lingers, NIS2 directive adopted, LastPass breached (again)

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The top 200 most common passwords in 2022 are bad, mkay? According to NordPass’... Read more »

1Password unveils ‘sign in with’ browser extension feature

1Password has unveiled a new ‘sign in with’ browser extension feature to help users get to where they’re going, more quickly. Users can now automatically save, store and autofill... Read more »

Kudelski Security Threat Navigator helps users improve defense strategies

Kudelski Security has launched Threat Navigator, a new tool that is included in Kudelski Security’s Managed Detection and Response (MDR) services. Using Threat Navigator, clients can visualize and understand... Read more »

Connected medical devices are the Achilles’ heel of healthcare orgs

The rising adoption of connected medical devices is accelerating cyberattacks, according to Capterra’s Medical IoT Survey of healthcare IT professionals. The survey also reveals that 67% of healthcare cyberattacks... Read more »

Phylum Automated Vulnerability Reachability strengthens software supply chain security

Phylum has added Automated Vulnerability Reachability to its software supply chain security platform capabilities. With the ability to focus only on fixing what matters, security pros can end the... Read more »
Subscribe to our Newsletter