Back to Security Basics
Lift your organisation’s security into the top 1% It’s a shocking statistic, but most businesses don’t have a cyber security plan. Given the lack of general interest in cyber security, it’s no ...
Choosing SOC Tools? Read This First [2024 Guide]
Shriram Sharma | | Data Loss Prevention (DLP), EDR, Extended Detection and Response, Identity and Access Management (IAM), Industry, intrusion detection systems, intrusion prevention systems, NDR, SIEM, SOAR, SOC tools, Threat Intelligence Platforms, TIP, Vulnerability Assessment Tools
Security operations centers (SOCs) are the front lines in the battle against cyber threats. They use a diverse array of security controls to monitor, detect, and swiftly respond to any cyber menace.These ...
The Role of ASPM in Enhancing Software Supply Chain Security
ASPM plays an essential role in optimizing your software supply chain security. Learn more about this critical facet of the SDLC and what the future holds for ASPM ...
DevOps pioneers navigate organizational transformation
The latest webinar in Sonatype's DevOps Download series, presented in partnership with The New Stack, offered an in-depth exploration into how DevOps pioneers are catalyzing significant shifts within organizations ...
Why Choose Akeyless over HashCorp Vault?
Artem Kazantsev, the Lead Security Engineer at adMarketplace, is committed to upholding the company’s reputation as a trusted consumer-centric advertising leader. With a steadfast dedication to protecting their clients’ sensitive data, including ...
XZ Utils-Like Takeover Attempt Targets the OpenJS Foundation
The OpenJS Foundation, which oversees multiple JavaScript projects, thwarted a takeover attempt of at least one project that has echoes of the dangerous backdoor found in versions of the XZ Utils data ...
Security Boulevard
Akeyless DFC 101—A Zero-Knowledge Approach
Akeyless DFC™ allows you to retain full ownership of your data while operating in a SaaS model. Take a peek under the hood to see how DFC keeps your data secure. The ...
Linux Backdoor Infection Scare, Massive Social Security Number Heist
Tom Eston | | backdoor, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, government, Government Contractor, Hacking, Information Security, Infosec, Linux, open source, pii, Podcast, Podcasts, Privacy, security, sensitive data, Social Security Numbers, technology, Weekly Edition, XZ Utils
In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained ...
Sisense Hacked: CISA Warns Customers at Risk
Richi Jennings | | Amazon Web Services (AWS), aws, AWS access keys, AWS bucket, cisa, CISA Advisories, CISA Advisory, CISA Alert, CISA warning, CISA.gov, depth, NSA/CISA, Sangram Dash, SB Blogwatch, Sisense
A hard-coded credential catastrophe: The analytics firm kept big companies’ secrets in an insecure AWS bucket. Government says victims include the “critical infrastructure sector.” ...
Security Boulevard
Managing Secrets Security at any Scale: introducing the GitGuardian Secrets Management Needs Quiz
Leverage our newest quiz to discover the most appropriate approach to managing secrets safely based on where your organization is today and how it will grow in the future ...