Search results: infrastructure-as-code

Seven API Security Predictions for 2022

|
If 2022 is anything like 2021, we’ll see no shortage of API-related events this coming year. In 2021, we saw many issues originating from leaky APIs, misconfigurations, weak or broken access controls, ...
Detecting Log4j (Log4Shell): Mitigating the impact on your organization

Detecting Log4j (Log4Shell): Mitigating the impact on your organization

The discovery of Log4j has DevOps teams working tirelessly to mitigate the issue. Here are six actions your organization should be taking now. The post Detecting Log4j (Log4Shell): Mitigating the impact on ...
How to cyber security: Software supply chain risk management

How to cyber security: Software supply chain risk management

Effective software supply chain risk management requires security measures throughout the entire supply chain. The post How to cyber security: Software supply chain risk management appeared first on Software Integrity Blog ...
threat-hunting program. threat hunting, teams, intelligence, Edge Devices data threats IT cybersecurity defense attack alerts machine identity management insider threats security phishing Cybersecurity Threats on the Rise

Cisco Survey Surfaces Legacy Infrastructure Security Challenges

A global survey of 5,123 active IT, security and privacy professionals conducted by YouGov on behalf of Cisco found well over a third of organizations (39%) are relying on what they consider ...
Security Boulevard
Microsoft Defender for Endpoint on AWS: Part 2

Microsoft Defender for Endpoint on AWS: Part 2

| | Cloud Security, FEATURED
In the first entry in this series, we explored what Endpoint Detection and Response (EDR) is, and why the Lightspin Office of the CISO uses it to secure our Amazon EC2 server estate ...
environment data cyberattacks defend wiper hermeticwiper malware wiper file systems storage Zerologon

How to Proactively Remove File-Based Malware

There’s no question that the past 18 months have been challenging for technology and cybersecurity leaders. Cyberthreats have skyrocketed at a time when companies have been enabling hybrid workforce models and transforming ...
Security Boulevard