Category List

Back to Security Basics

Back to Security Basics

Lift your organisation’s security into the top 1% It’s a shocking statistic, but most businesses don’t have a cyber security plan. Given the lack of general interest in cyber security, it’s no ...
What is SOAR (Security Orchestration, Automation and Response)? Explained by a SecOps Professional

Choosing SOC Tools? Read This First [2024 Guide]

Security operations centers (SOCs) are the front lines in the battle against cyber threats. They use a diverse array of security controls to monitor, detect, and swiftly respond to any cyber menace.These ...
The Role of ASPM in Enhancing Software Supply Chain Security

The Role of ASPM in Enhancing Software Supply Chain Security

ASPM plays an essential role in optimizing your software supply chain security. Learn more about this critical facet of the SDLC and what the future holds for ASPM ...
DevOps pioneers navigate organizational transformation

DevOps pioneers navigate organizational transformation

The latest webinar in Sonatype's DevOps Download series, presented in partnership with The New Stack, offered an in-depth exploration into how DevOps pioneers are catalyzing significant shifts within organizations ...
adMarketplace Testimonial

Why Choose Akeyless over HashCorp Vault?

Artem Kazantsev, the Lead Security Engineer at adMarketplace, is committed to upholding the company’s reputation as a trusted consumer-centric advertising leader. With a steadfast dedication to protecting their clients’ sensitive data, including ...
open source security

XZ Utils-Like Takeover Attempt Targets the OpenJS Foundation

The OpenJS Foundation, which oversees multiple JavaScript projects, thwarted a takeover attempt of at least one project that has echoes of the dangerous backdoor found in versions of the XZ Utils data ...
Security Boulevard
Akeyless's Distributed Fragments Cryptography (DFC) Demo

Akeyless DFC 101—A Zero-Knowledge Approach

| | DEVOPS, security
Akeyless DFC™ allows you to retain full ownership of your data while operating in a SaaS model. Take a peek under the hood to see how DFC keeps your data secure. The ...

Linux Backdoor Infection Scare, Massive Social Security Number Heist

In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained ...
Seal of the Cybersecurity & Infrastructure Security Agency

Sisense Hacked: CISA Warns Customers at Risk

A hard-coded credential catastrophe: The analytics firm kept big companies’ secrets in an insecure AWS bucket. Government says victims include the “critical infrastructure sector.” ...
Security Boulevard
Managing Secrets Security at any Scale: introducing the GitGuardian Secrets Management Needs Quiz

Managing Secrets Security at any Scale: introducing the GitGuardian Secrets Management Needs Quiz

| | DevSecOps
Leverage our newest quiz to discover the most appropriate approach to managing secrets safely based on where your organization is today and how it will grow in the future ...