Category List

Palo Alto Networks XSOAR Integration: Maximizing Automation for Incident Detection and Remediation

Palo Alto Networks XSOAR Integration: Maximizing Automation for Incident Detection and Remediation

| | Security Automation, SOAR
Automation is becoming more and more prevalent and sought after by Security Operations Centers (SOC). This is driven by the increasing cybersecurity skills gap, intensified by the volume of security data and ...

Open Source Does Not Equal Secure

Way back in 1999, I wrote about open-source software: First, simply publishing the code does not automatically mean that people will examine it for security flaws. Security researchers are fickle and busy ...
Thundra Logo Z

The difference between Monitoring and Observability

Legacy methods based on handling predictable failures often do not work well while monitoring modern distributed applications. Efficient debugging and diagnostics require that the system be observable with a microservice architecture now ...
SWAP Detector: Preventing API Errors from Swapped Arguments

SWAP Detector: Preventing API Errors from Swapped Arguments

Third-party application programming interfaces (APIs), libraries, and frameworks are a fact for modern software developers. They are usually complex, rapidly evolving, and sometimes poorly documented. According to industry estimates, open-source components can ...

How a Healthcare Leader Unlocked the Secret to Exceptional Patient Care

Technology is transforming the way healthcare organizations deliver patient care. As people continue to hold their… The post How a Healthcare Leader Unlocked the Secret to Exceptional Patient Care appeared first on ...
How Agencies Can Take Advantage of DevSecOps and Automation to Accelerate ATOs

How Agencies Can Take Advantage of DevSecOps and Automation to Accelerate ATOs

As federal agencies develop more online services and systems to meet the mission of the U.S. government, their appetite and need to develop and deploy secure software applications rapidly continues to grow ...
CISO Blog Image

CISO Roundtable: What We’ve Heard, and What We’re Looking Forward To

Sonrai Security has sponsored and moderated boardroom discussions with Evanta CISOs and we wanted to share our key public cloud takeaways. The post CISO Roundtable: What We’ve Heard, and What We’re Looking ...
Remote workforce, web portal, and DevSecOps: Three focus areas for cybersecurity

Remote workforce, web portal, and DevSecOps: Three focus areas for cybersecurity

  According to the 2020 Deloitte-NASCIO Cybersecurity Study for state governments, 54 percent of states are not confident in their ability to protect emerging technology. Traditional cybersecurity approaches can result in singularly focused ...
DevSecOps

DevSecOps: 4 Reasons You Need One

Those familiar with the world of software and application development are probably aware of the concept of DevOps. But what about DevSecOps? DevSecOps essentially adds another layer to the process by combining ...
Security Boulevard
CSPM

The Evolution of Cloud Security Posture Management

Get the right CSPM platform to automate your cloud against hundreds of configuration and security best practices. The post The Evolution of Cloud Security Posture Management appeared first on Sonrai Security ...