The Latest Intel on Wipers

The Latest Intel on Wipers

The mass distribution of wiper malware continues to showcase the destructive evolution of cyberattacks. Does the evidence corroborate the theory that the ongoing conflict in Europe is to blame for the rise in wipers? Indeed. Furthermore, given that Russia is...
Open source: the top-10 risks for business

Open source: the top-10 risks for business

IT companies were the first to go open source, and many large businesses followed suit. After all, the ability to reuse and independently modify code as well as fix bugs spurs rapid innovation and cost reduction. But open source has some inherent negative...
Getting real on AI in application security

Getting real on AI in application security

AI is definitely the hot topic right now, and a lot of people are throwing around or downright parroting information and opinions. Invicti’s CTO and Head of Security Research, Frank Catucci, spoke to Mike Shema on episode #234 of the Application Security Weekly...
5 Pillars of a Strong Data Loss Prevention Strategy

5 Pillars of a Strong Data Loss Prevention Strategy

Data loss prevention (DLP) security solutions can play a pivotal role in protecting your most sensitive data assets. But if you procure a leading DLP solution, you must have an effective accompanying data loss prevention strategy to get the most protection from your...
Best Practices for Security Hardening

Best Practices for Security Hardening

As the attack surface grows, CISOs and IT leaders must take the steps necessary to protect their rapidly expanding networks and increasingly distributed workforce. One effective approach is known as systems or security hardening. In this blog, we define security...