Beware the ‘Secret Agent’ Cloud Middleware

Beware the ‘Secret Agent’ Cloud Middleware

Last Thursday, at RSA Conference in San Francisco, the researchers from Wiz.io unveiled an open-source cloud middleware database on GitHub that details the particular middleware agents that Amazon Web Services (AWS), Google, and Microsoft put on their cloud customers'...

What is a SOC 1 report?

What is a SOC 1 report?

A SOC 1 report is an evaluation of a company's internal controls related to financial reporting. The purpose of a SOC 1 report is to give organizations comfort that their service providers have adequate controls and procedures in place to protect their data and...

Follina: A New Microsoft Zero-Day Attack is Now Underway

Follina: A New Microsoft Zero-Day Attack is Now Underway

Worried about fraud, employers are shifting to authentication technologies that are both secure and user-friendly. But there's a catch. Adversaries are actively exploiting a readily exploitable vulnerability in the Microsoft Support Diagnostic Tool (MSDT) in Windows,...

PCI DSS 3.1: In Review of the Old Standard

PCI DSS 3.1: In Review of the Old Standard

Blog  The PCI DSS is a set of security standards created by the Payment Card Industry Security Standards Council (PCI SSC). The council was formed by the major credit card companies (Visa, MasterCard, Discover, American Express, and JCB) in 2006 to establish...