Blog - TSP

Leading tech providers commit to secure by design pledges, says CISA

The Cybersecurity and Infrastructure Security Agency (CISA) has announced that 68 top software manufacturers have voluntarily committed to CISA’s Secure by Design pledge. These software manufacturers have pledged to make measurable progress towards seven specific goals to enhance the security of critical infrastructure. The seven goals outlined in this commitment, to be achieved within a […]

A software supply chain attack affected 59% of organizations

A report by the Ponemon Institute found that 59% of organizations experienced a software supply chain attack, with 54% of these respondents having experienced one in the past year. This survey was conducted among 1,278 IT and IT security practitioners, with managers, directors and senior executives making up nearly half (49%) of the survey demographic. […]

The Benefits of Using Predictive Risk Scoring in Security AI

Invicti recently launched its Predictive Risk Scoring feature, which is a groundbreaking industry first that can generate accurate security risk predictions before vulnerability scanning even begins. To learn more, visit Predictive Risk Scoring for details. This feature utilizes a custom-built machine learning model trained on real-world vulnerability data (excluding customer data) that is operated internally […]

Meta is the second most commonly imitated brand for credential phishing

A recent report by Cofense delves into the intricate details of a sophisticated phishing campaign designed to circumvent multi-factor authentication (MFA) in order to target Meta business accounts. The report uncovers the existence of a cybercrime toolkit that enables malicious actors to craft links, emails, and other deployable tools. This campaign is currently capable of […]

Half of threat detections in Q1 2024 were attributed to malware

A recent report by ReasonLabs analyzed cybersecurity and threat intelligence. The report revealed that malware accounted for nearly 50% of global detections in Q1 of this year, with Adware and Phishing detections following closely. In the U.S., phishing detections were most prevalent at over 56%, with Malware and Adware detections following behind. The report also […]

FTC directs Cerebral to limit sharing of consumer data

The Federal Trade Commission (FTC) has mandated that Cerebral, Inc. limit its use and disclosure of sensitive consumer data and provide consumers with an easy way to cancel services. The order aims to resolve FTC allegations that the telehealth company failed to adequately protect sensitive health data. As per the proposed order filed by the […]

Selecting the Appropriate Application Security Tools

Modern application security must be built in from the outset and reinforced continually throughout the software development lifecycle. Even organizations with mature application development practices need automated tools to successfully and repeatably secure their software in complex, fast-changing environments. Security leaders commonly focus on ensuring software security through runtime protection measures, with major cloud service […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC