Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

TrustRadius Names Rubrik as Top Rated Provider in Data Security Categories

Over 4,000 customers around the world trust Rubrik to protect, automate, and govern their applications at massive scale in one seamless fabric across data centers and clouds. It goes without saying that we truly value these partnerships and relentlessly strive to bring our customers peace of mind. With over 60,000 high-quality, in-depth user reviews analyzed from the last 12 months, we are honored to be awarded TrustRadius’ Top Rated 2022 award for nine categories.

Automatic Kubernetes Data Replication with Open Policy Agent (Part 1)

Open Policy Agent (OPA) is widely used to provide security and compliance policy guardrails for Kubernetes. The built-in role-based access controls in Kubernetes are not sufficient for fine-grained policy. OPA is a proven solution for implementing strong, granular policy checks for cluster resources during Admission Control. OPA users implement fine-grained policy in the form of rules written in Rego, the declarative policy language of OPA.

The Complete Guide: Migrating from LastPass to Keeper

Businesses looking for a LastPass alternative should find a solution that is more than just a password manager. Keeper Security is the ideal password management solution for growing small and medium-sized businesses (SMB). We offer tools for password management, secrets management, remote connection and other security features to protect you and your team. Fortunately, migrating over to Keeper has never been easier.

Out-of-band application security with Intelligent Orchestration

Intelligent Orchestration enables security and development teams to implement coordinated DevSecOps workflows with minimal friction. Application security (AppSec) adds an extra layer to software development. The more the process is automated and the more tools are integrated into the continuous delivery/continuous deployment (CI/CD) pipeline, the more challenges organizations face in securing software security from end to end (false positives, noise, etc.).

Navigating the Challenges of Cross-Cluster Migration of Kubernetes Workloads with CloudCasa

Cross-cluster migration of Kubernetes workloads continues to be challenging since workloads are isolated from each other by design. There are several reasons why you may want to separate your workloads, whether it is to reduce complexity or to have the cluster closer to the user base. However, this can be complex as Kubernetes has many components.

Phishing: Better Proxy than Story

In the last phishing blog we discussed how modern phishing works on the frontend. Read on to find out how threat actors can easily find and authenticate a suitable domain by modifying both Gophish and Evilginx to evade security controls In the last phishing blog we discussed how modern phishing works on the frontend. Here we go behind the scenes to dissect how to configure and authenticate a good domain for your phishing campaign using Apache as Reverse Proxy. Excited? You caught the hook, read on!

Featured Post

Three Hard Truths About Organizational Cybersecurity

In recent years, many business and IT decision-makers have missed key opportunities when it comes to essential organizational cybersecurity practices - from not properly segmenting networks and not deactivating unused accounts (or protecting them with multi-factor authentication), to not implementing proper password security controls. As a result, organizations are increasingly falling victim to costly and damaging data breaches, replete with the associated disruption to operations and issues with both legal and public relations departments.

Top 5 NPM Vulnerability Scanners

The world of software development has been rocked by JavaScript. With nearly every modern web app making extensive use of JavaScript on the front end. And with JavaScript’s popularity also on the backend with Node.js, it’s hardly surprising that new vulnerabilities are emerging daily, given the sheer volume of open source project dependencies being used by JavaScript developers. The culprit? It all comes down to the free-ware NPM packages installed within Node.js.

KuppingerCole Ranks SECUDE As Outstanding In Extending MPIP In Its Secure Collaboration Market Compass Report, 2022

LUCERNE, JULY 2022: SECUDE, an established global data-centric security service provider, today announced it has been awarded the highest possible scores in security, deployment, and usability in the KuppingerCole 2022 Market Compass Report: Secure Collaboration for its outstanding ability in extending Microsoft Purview Information Protection (MPIP).