Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Improve productivity with advanced graymail filtering

Graymail is a nuisance. While the emails are technically solicited, graymail has long been seen to hinder organizations' productivity by distracting employees from messages that matter. When we published the Phishing Threat Trends Report in October 2023, we wanted to look at cybersecurity in a more holistic way and one of the recurring themes that came up in our research was graymail and the effect it can have on productivity levels within a business.

Caesars Entertainment Breach Update, Millions of Gambler Records Compromised

Caesars Entertainment (CE) oversees 58 gaming properties across the continental states. Their locations include world destinations, nightlife activities, a comprehensive concierge, and an industry-leading approach to draw millions of gamblers weekly. Those who gamble with a Caesars location often enough eventually consider a membership. CE’s loyalty program boasts more than 65 million members worldwide.

JFrog Log Analytics with Datadog just got better!

The software supply chain today runs differently than it did just five years ago. The number of available tools, languages, and packages used have exploded. Further, the growing mix of OSS packages puts organizations at risk of outdated software, untracked dependencies, and non-compliant licenses. To add to the chaos, teams are now increasingly distributed and greater in number. All of this dramatically increases the number of inputs within the software supply chain.

Rising CVEs and the need for speed: Enhancing software security with JFrog Xray and PagerDuty

With the proliferation of CVEs (Common Vulnerabilities and Exposures), we have witnessed a remarkable surge in associated risks over the past five years. 2022 was a record-breaking year with 25,096 new CVEs found, the most discovered CVEs ever. Unfortunately, 2023 is on track to beat that record.

Top Open Source Licenses Explained

An open source license is a binding legal contract between author and user that declares the certain conditions in which a piece of software can be used, which is especially relevant in commercial applications. This license is what turns software components into open source components, allowing developers to use that software so long as they keep the specific terms and conditions laid out in the license. There are a lot of open source licenses, over 200 in fact.

Cronos Group chooses Aikido Security to strengthen security posture for its companies and customers

An IT match made in… Belgium! Aikido Security, a SaaS startup from Ghent, will provide application security to The Cronos Group, an e-business integrator headquartered in Kontich, with over 5,000 clients across their 570+ companies in the Benelux region. This strategic partnership is set to fortify The Cronos Group’s security posture and Aikido Security’s influence in the cybersecurity industry.

OWASP Clickjacking: The Enhanced Cheat Sheet [XLS DOWNLOAD]

Clickjacking is a widely used cyberattack technique where users are tricked into clicking on something without realizing it’s harmful. Clickjacking attacks can lead to serious problems like data theft and financial fraud, damaging organizations’ reputations. According to the Javelin 2022 Identity Fraud Study, 22% of U.S. adults have been victims of account takeover attacks. But here’s the good part.

Mastering The DevOps Toolchain: 10 Essential to Build a DevOps Assembly Line

DevOps is more than just a buzzword and the dev behind the magic is more than just a tech wizard who orchestrates software delivery single-handedly. Behind the curtains is an assembly line of toolchains that makes DevOps possible. 44% of DevOps teams use between 2-5 tools, with 41% using 6-10 tools. High-performing teams also tend to use more tools, resulting in faster deployment cycles and delivering multiple times a month.