To Map Shadow IT, Follow Citizen Developers

November 19, 2024 at 06:35AM Shadow IT arises when employees use unapproved software to enhance productivity, bypassing cumbersome processes and security mechanisms. This trend persists even in small startups and can be exacerbated by no-code/low-code tools, which can create custom applications that interact with unauthorized systems, posing security risks while potentially enhancing visibility for IT … Read more

SOC Around the Clock: World Tour Survey Findings

November 4, 2024 at 10:39PM SOC teams aim to enhance cybersecurity by breaking data silos and integrating tools into a unified platform, leveraging AI for faster threat response. Key technologies to explore include AI, zero-trust architectures, and identity management. Utilizing managed services can optimize resources, while a comprehensive platform approach ensures effective risk mitigation and … Read more

Realm.Security Emerges From Stealth With $5 Million in Seed Funding

September 12, 2024 at 10:54AM Realm.Security, a Boston-based company, recently came out of stealth mode with $5 million in seed funding. Founded by cybersecurity experts, the company aims to efficiently manage security data using AI and data processing technology. Their platform is designed to integrate with various cybersecurity products and address the increasing challenge of … Read more

Unprecedented: Cloud Giants, Feds Team on Unified Security Intelligence

July 12, 2024 at 02:34PM The top US cloud service providers are collaborating on a National Cyber Feed Initiative to provide real-time threat-monitoring data to federal cybersecurity authorities. The effort aims to improve threat intelligence sharing and cybersecurity. Challenges remain, including standardizing data delivery and making the information consumable. The initiative has gained momentum and … Read more

Addressing the Cybersecurity Vendor Ecosystem Disconnect

May 16, 2024 at 05:54PM The cybersecurity industry faces challenges with data integration, collaboration, and customer security. Vendors’ hypercompetitive dynamic results in complexity, while new technology increases vulnerability. Collaboration, shared standards, greater data control, and investment in cross-technology integration are essential steps to improve network defense without compromising business health. Cooperation within the industry against … Read more

Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data

October 26, 2023 at 02:57PM Open source data integration platform Mirth Connect has a remote code execution vulnerability, according to cybersecurity firm Horizon3.ai. The vulnerability, tracked as CVE-2023-43208, bypasses a critical-severity flaw disclosed earlier and affects all Mirth Connect installations. A patch has been released, but the cybersecurity firm warns that the vulnerability is easily … Read more

Critical Flaw in NextGen’s Mirth Connect Could Expose Healthcare Data

October 26, 2023 at 04:48AM Users of Mirth Connect, an open-source data integration platform, are urged to update to version 4.4.1 due to the discovery of an unauthenticated remote code execution vulnerability (CVE-2023-43208). Horizon3.ai warns that attackers may exploit this vulnerability to gain access to sensitive healthcare data. The flaw affects various versions of Mirth … Read more