Enhancing software supply chain security in financial services with Sonatype and AWS

Enhancing software supply chain security in financial services with Sonatype and AWS

Financial services organizations prioritize software security as part of their risk management strategy. Open source components accelerate software development, and organizations benefit from implementing appropriate security controls to manage potential associated risks ...
Untangling AWS Networks with Cloud WAN

Untangling AWS Networks with Cloud WAN

As organizations grow so does their infrastructure, often without a well-designed underlying infrastructure to support this growth. At GuidePoint Security […] ...
Codefinger Ransomware: Detection and Mitigation Using MixMode

Codefinger Ransomware: Detection and Mitigation Using MixMode

The Codefinger ransomware represents a new frontier in cyber threats, specifically targeting AWS S3 buckets. By exploiting Server-Side Encryption with Customer-Provided Keys (SSE-C), attackers gain control over the encryption process, rendering recovery ...
MFA, AWS, password, manager, cyberattacks, cybersecurity, MFA CISA multi-factor authentication

AWS Makes Significant Progress on Driving MFA Adoption

| | aws, MFA, password manager
Amazon Web Services (AWS) is reporting that since last April more than 750,000 root user accounts on its AWS Organizations console for managing access to cloud services have enabled multifactor authentication (MFA) ...
Security Boulevard
security, multicloud, encryption, keys, sysdig, access, cloud security, Wiz, assets, security, multi-cloud, strategies, security, AWS, Amazon, cloud, cloud environment, data privacy, data protection, cloud security teams, security, cloud-native, Palo Alto Dell zero trust Network Security multi-cloud zero-trustQualys multi-cloud Wi-Fi 6 access point zero-trust cloud security remote data protection

AWS Adds Mutiple Tools and Services to Strengthen Cloud Security

| | aws, Cloud Security
Amazon Web Services (AWS) this week made a bevy of updates to improve cloud security, including additional machine learning algorithms for the Amazon GuardDuty service that make it simpler to detect attack ...
Security Boulevard
email, attacks, Google Yahoo spam Proofpoint spoofed phishing

Defending Against Email Attachment Scams

One of the most alarming methods of attack involves intercepting email attachments during transit, resulting in the theft of personally identifiable information (PII) and other sensitive data ...
Security Boulevard
ADDO session: Secure your application supply chain on AWS

ADDO session: Secure your application supply chain on AWS

We've wrapped up our 9th All Day DevOps (ADDO) event, where we've learned from the industry's best and brightest about the latest tools and methodologies for securing the software supply chain. Hossam ...
ADDO session: Building observability to increase resiliency

ADDO session: Building observability to increase resiliency

As part of the DevOps and DevSecOps track during Sonatype's 9th All Day DevOps (ADDO) event, AWS Senior Developer Advocate Guillermo Ruiz presented his session titled "Building Observability to Increase Resiliency." Well-applied ...
Accelerate FedRAMP Compliance on Amazon EKS with Anchore

Accelerate FedRAMP Compliance on Amazon EKS with Anchore

| | Anchore, aws, Compliance, EKs, FedRAMP
FedRAMP compliance is table stakes for many enterprises in order to serve government agencies and contractors. Over the past decade, FedRAMP has become more complex and comprehensive. Many enterprises running Amazon EKS ...
How Displays2go Increased Conversions & Reduced Costs with DataDome

How Displays2go Increased Conversions & Reduced Costs with DataDome

By partnering with DataDome, Displays2go successfully eradicated bots and scraping, ensuring accurate data and reducing unnecessary expenses ...