Cybersecurity in 2022: It’s Not Getting Easier
As we wrap up the year, it always makes sense to take a look back and see what worked and what didn’t; what we can do better and what we have to accept. When 2021 ended, it was pretty bad. We were still trying to navigate COVID-19 and plan for a return to in-person..
Vulnerabilities for AI and ML Applications are Skyrocketing
In their haste to deploy LLM tools, organizations may overlook crucial security practices. The rise in threats like Remote Code Execution indicates an urgent need to improve security measures in AI..
Cheap ‘Junk-Gun Ransomware’ Emerging on the Dark Web
While inexpensive and crudely built, the ransomware variants still post a threat to smaller companies and individuals, Sophos..
What Makes Containers Vulnerable?
Read this quick guide to the types of vulnerabilities that affect containers. The post What Makes Containers Vulnerable? appeared first on..
USENIX Security ’23 – NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers
Authors/Presenters: *Yehuda Afek and Anat Bremler-Barr, Shani Stajnrod* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel...
DevOps pioneers navigate organizational transformation
The latest webinar in Sonatype's DevOps Download series, presented in partnership with The New Stack, offered an in-depth exploration into how DevOps pioneers are catalyzing significant shifts within..
To Breach or Not to Breach
The rapid adoption of could computing was yesterday’s news 5 years ago. Today’s news is that one of the most critical cloud security technologies is woefully ineffective. In addition to efficacy, it is critical to measure operational efficiency. In other words, it doesn’t matter how effective a solution can be if you can’t manage it...
Randall Munroe’s XKCD ‘Eclipse Path Maps’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD..
What to Consider When Choosing a Software Composition Analysis (SCA) Tool
Given the widespread use of third-party components in application development, identifying and remediating code vulnerabilities as early in development as possible is critical. As a result, many organizations turn to SCA tools, however traditional ones often deliver superficial code analysis that floods developers with irrelevant or non-actionable alerts, including numerous false positives. As..
House Passes Privacy-Preserving Bill, but Biden Blasts it
Are you a FANFSA fan? The White House isn’t. It says the bill “threatens national security.”..
DataDome Renews SOC 2 Type 2 Compliance
DataDome's SOC 2 Type 2 compliance has been renewed for another year, further underlining that our security controls for customer data align with the AICPA's SOC 2..