In our last blog, we discussed how OAuth-based consent phishing attacks have been used to trick users into giving malicious ...
VP, Cybersecurity Services at Cowbell, a leading provider of cyber insurance for small and medium-sized enterprises. Matthieu holds a Ph.D. from Purdue University and is an expert in cybersecurity and ...
As we kick off 2025, software's role in our daily lives has never been more apparent, and the integrity of our open source ...
The Application Security (AppSec) landscape is changing fast. With recent high-profile breaches and a wave of new Application ...
Beyond the Perimeter: Addressing Blind Spots in Identity Security for 2025. Our founder Simon Moffatt will be in conversation ...
If approved, the proposed new HIPAA rules will reshape the landscape of healthcare cybersecurity, partially addressing the recent OIG report’s findings on the ineffectiveness of current HIPAA audits.
Overview: We hope you had a fantastic holiday! Unfortunately, the Grinch might have left one last surprise for us – Tenable has identified a critical issue affecting Nessus Agent versions 10.8.0 and ...
China is continuing to target U.S. entities in its efforts regarding Taiwan, including using state-sponsored Flax Typhoon to compromise Guam infrastructure. U.S. are pushing back, with the Treasury ...
Source Defense In a recent high-profile incident covered by Forbes, our Source Defense Research team identified a sophisticated Magecart attack targeting the European Space Agency’s online store. This ...
What happens when cutting-edge technology meets the reality of securing modern applications? That’s the question our expert panel tackled in this conversation on how eBPF is reshaping application ...
Too many AST tools create noise for security and dev teams. Learn why automation is key to finding and fixing what’s important.The post Overcome AST noise to find and fix software vulnerabilities ...
Source Defense With the introduction of PCI DSS 4.0, merchants are now grappling with new requirements that aim to enhance the security of cardholder data. At a QSA roundtable hosted by Source Defense ...