Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

Detect malware in your containers with Datadog Cloud Security Management

Detecting malware in container environments can be a major challenge due to the rapid development of malicious code, the proliferation of insecure container images, and the multilayered complexity of container stacks. Staying ahead of attackers means tracking the constant evolution of malware and rooting out threats in your codebase at the expense of considerable compute.

What is Infrastructure as Code Security (IaC) - Risk, Challenges & Best Practices

In recent years, Infrastructure as Code (IaC) has emerged as a game-changer for managing IT operations. By enabling teams to define and manage infrastructure using codes, IaC offers numerous benefits, such as increased agility, scalability, and consistency. However, along with the advantages, some unique security challenges also arise that must be addressed promptly. Here in the blog, we’ll explore the best practices to maintain the integrity and reliability of the Infrastructure.

Software Supply Chain Attacks: Notable Examples and Prevention Strategies

Supply chain attack is a kind of cyberattack which targets the network that is made up of suppliers, vendors, contractors and other business partners that organizations rely on to provide goods and services. As opposed to directly attacking a target organization’s systems or infrastructure, attackers use supply chain vulnerabilities to gain unauthorized access or compromise the integrity of products or services.

Step-by-Step Guide to Creating Issue Templates in GitLab

Managing software projects is often like trying to solve a puzzle when some of the pieces are missing. That’s where GitLab issue templates come in. Issue reports don’t have to be riddles anymore because with GitLab issue templates, all of your reports will be clear and complete. It’s all about getting it right the first time! These templates are like your time savers. They reduce the back-and-forth of issues, allowing you to focus on fixing the issue rather than trying to comprehend it.

Coralogix Alarms: Faster than WAF IP Detection and Remediation

There is one area of technology that requires the fastest possible response time, where every second has potentially enormous implications – security. Coralogix fits the security use cases elegantly for a simple reason. It’s very, very fast. Coralogix alarms fire faster than any of our competitors. When benchmarking our closest competition, whose alarms responded in around 2-4 minutes, we left them behind with a median trigger time of 10 seconds across log alerts.

Critical insights into Australia's supply chain risk landscape

Australian organizations find themselves navigating a minefield of supply chain risks, with a surge in incidents stemming from multi-party breaches. These breaches are often caused by vulnerabilities in cloud or software providers and are emerging as a challenge that demands attention and proactive strategies. From July to December 2023, 483 data breaches were reported to the Australian Information Commissioner (OAIC), up 19% from 407 between January and June of the same year.

Achieving continuous compliance with Tripwire's Security Configuration Manager

Security and compliance are often tightly intertwined. The main difference is that sometimes security can outpace compliance efforts. While it is easy to infer that a more secure system exceeds a compliance requirement, an auditor should not be expected to deduce the state of a system; the evidence needs to be clear. There are many factors that can cause compliance shifts.

JumpCloud Acquires Resmo for Integrated Asset Management

JumpCloud has acquired Resmo, an asset management and SaaS security solution, to provide customers a unified solution of SaaS, IT security, and asset management that empowers them to eliminate shadow IT and gain full visibility into all apps and cloud infrastructure in an all-in-one solution. The inclusion of Resmo’s technologies will enhance JumpCloud’s ability to help customers deliver secure and streamlined user provisioning, access request management, and utilization monitoring.

The Crucial Role of Network Policies and Encryption in Securing Kubernetes Workloads

Ensuring the security of containerized workloads has become a top priority given the accelerated adoption of managed Kubernetes services. The complexity of hosting these workloads securely in the cloud necessitates a comprehensive array of security measures. Among these, network policies and encryption stand out as indispensable prerequisites for safeguarding sensitive workloads in a shared, multi-tenant environment.

The Dangers of Double and Triple Extortion in Ransomware

The 2023 ransomware attack at the University of Manchester didn’t stop once the threat actors had successfully exfiltrated the personal identifiable information (PII) for faculty and staff, plus 250 GB of other data. When the university showed hesitation toward paying the ransom, they turned to a tactic that is becoming increasingly popular among cybercriminals — triple extortion.