Search

Search Results for:
421 Results Found
Can't find what you're looking for? Search our Knowledge Base.
The NIS2 Directive and how to prepare for compliance
Blog
The NIS2 Directive, published in December 2022, sets out a series of measures for improving cyber risk management throughout the European Union. All EU member states must apply the Directive as part of national law by October 2024. By the same date, all applicable organizations must comply with the measures...
La Nueva Revolución del Threat Intelligence
Resource > Webinar
Sobre esta charla En este webinar exploraremos las últimas tendencias del campo de la cyberinteligencia de amenazas. Hablaremos de diferentes casos de uso, sus aplicaciones y cómo estos estan cambiando la forma de proteger a los usuarios, las empresas y sus datos. Tambien vemos como la cyberinteligencia de amenazas puede...
Outpost24 CORE delivers complete visibility of technology assets and threat exposure, with business-level mitigation guidance
Blog
Philadelphia, PA, July 19, 2023 – Leading cyber risk platform provider Outpost24 today announced the release of Outpost24 CORE, a ground-breaking unified exposure management solution that gives unprecedented visibility and real-time insights into an organization’s IT asset inventory and their threat exposure across the entire attack surface. With the threat of cyberattacks...
Does PCI DSS v4.0 require a pen test?
Blog
PCI version 4.0 was released in March 2022, and all organizations that must be compliant with the regulation have a deadline of March 31, 2024 to do so. So, what does the new version say about pen testing? According to Requirement 11 of the Payment Card Industry Data Security Standard...
Web Application Security for Retail & Ecommerce Report
Resource > Research
Global online sales went up 71% year-over-year. As e-commerce sales get a massive boost in the wake of the coronavirus pandemic, so has targeted cyberattacks on the application layer. It’s never been more important for the retail sector to prioritize web application security to protect customer data and avoid costly...
The DevOps Guide to Application Security
Resource > Whitepapers
Embrace DevSecOps A primer for securing DevOps Web app attacks remain the #1 vector exploited in successful breaches. With agile development, apps run the risk of creating new vulnerabilities or perpetuating old ones on a weekly, daily, even hourly basis, security and risk managers need to step up a programmatic...
A Strategy to Improve Zero-Day Vulnerability Detection
Resource > Whitepapers
Businesses are continuing to grow and investing more in technology stacks, creating more vulnerabilities as cyber criminals look for new risks to exploit. Security leaders are having to take a more strategic approach, especially as digital transformation grows creating demand for zero-day vulnerability detection. When deciding on a vulnerability management...
Web Application Security for Insurance
Resource > Research
Attacks against the financial sector increased 238% globally. The pandemic has caused insurance companies to introduce more applications than ever to stay competitive. However, the demands for accelerated development often outpace the speed to remediate code vulnerabilities, creating ‘security debt’ that keeps adding to their risk exposure whilst never being fixed once released. The problem...
Web Application Security for Pharma and Healthcare Report
Resource > Research
COVID-19 has put the healthcare industry under exponential strain. As we see a surge in ransomware attacks on the sector this study examines the unique vulnerabilities of healthcare applications, highlighting how the pandemic has exacerbated cyber risk and presents practical recommendations for mitigation. We used our external attack surface management tool (EASM) to uncover and...
Threat Intelligence for the Healthcare Sector
Resource > Research
Download “In Good Health” whitepaper with an overview of the healthcare sector threat landscape. Our whitepaper answers some of the most relevant questions: why is the healthcare sector targeted and how do cybercriminals profit from the health data. In the document, you will find: The coverage of the recent breaches The overview...