Deploying DevSecOps with Scalability in Mind

Businesses of all sizes are embracing the DevOps model to accelerate digital transformation and become more agile. While few can dispute the benefits that the DevOps model brings to businesses, security concerns exist. Many businesses, in their rush to deploy applications rapidly and embrace a continuous delivery cycle, are overlooking the importance of cybersecurity. The..
Read more

Open and Dark Web Research: Tips and Techniques

Cyber threat intelligence’s alignment with the traditional, OSINT processes of our intelligence community, law enforcement, and the military continues to grow. At Authentic8, a team of experienced cross-functional intelligence analysts builds “Flash Reports” for the readers to augment their OSINT techniques. Authentic8 has packaged some of these reports to help researchers leverage cross-functional OSINT tactics..
Read more

SANS 2019 Threat Hunting Survey: The Differing Needs of New and Experienced Hunters

SANS threat hunting experts Mathias Fuchs and Joshua Lemon capture the different needs within organizations that are just starting their threat hunting journey, versus those who are honing their skills and programs. Read the report to help grow your program and improve threat hunting with: Definitions of threat hunting Methodologies of performing threat hunting Spending..
Read more

Open Source Security: Weighing the Pros and Cons

Over the past few years, open source has grown in popularity, especially among developers using open source code in their application development efforts. Open source software offers incredible benefits to enterprises IT and development efforts. Free, available software libraries mean cost savings, easy customization, speed, agility and flexibility for development and IT teams. There are..
Read more

Developers Are Taking Over AppSec

Application security is a top priority today for companies that are developing software. However, it is also becoming more challenging and complex as release frequency continues to rise and the requirements for data security are getting stricter. Thanks to new DevOps practices and tools, development cycles are getting shorter, allowing organizations to meet market demands..
Read more