Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

DevSecOps build and test process

In the previous article about the coding process, we covered developers using secure coding practices and how to secure the central code repository that represents the single source of truth. After coding is complete, developers move to the build and test processes of the Continuous Integration (CI) phase. These processes use automation to compile code and test it for errors, vulnerabilities, license conformity, unexpected behavior, and of course bugs in the application.

Kubescape March 2022 version - what is new and what is improved

The ARMO Kubescape team has been busy lately… we have several new and improved features for you that we are very excited about. Based on the feedback and ideas we got from the amazing community, we worked hard to enhance Kubescape with better and deeper scanning capabilities, UI improvements, and a more friendly CLI version. We invite everyone to shape the Kubescape roadmap by giving us feedback and suggestions using git, discord, or mail.

The Impact of Cyberattacks on Healthcare

While the COVID-19 pandemic brought much of the world to work together to advance medical research and slow the spread of the disease, it may be of little surprise that cyber threat actors took advantage of the pandemic for their own personal gain. While all industries can be affected by a cybersecurity incident, the nature of the health and human services industry’s mission poses unique challenges.

Make Snyk notifications work for you

Snyk can send a number of different types of email notifications. Notifications can be powerful when they enable you to learn about a new vulnerability, license issue, or fix an issue in your projects on the same day we find it. However, these alerts can be noisy if they aren’t configured according to the needs of your teams. That’s why we’ve made Snyk notifications flexible! Let’s take a look at how to make them work for you.

Why The Four Eyes principle is critical for access

The four-eyes principle means an activity must be approved by two people, or from Argus Panoptes if the ancient Greeks needed access controls. This principle is commonly used in both routine and non-routine scenarios. On the routine side are “Business Execution” processes. Here the Four Eyes principle is used to stop negative outcomes as the result of poor execution of a regular business task.

The U.S. Department of Justice Announces Takedown of the Cyclops Blink Botnet

Today, the U.S. Department of Justice (DOJ) announced further actions to disrupt Cyclops Blink, a sophisticated state-sponsored botnet that affected network devices from multiple vendors, including a limited number (less than 1%) of WatchGuard firewall appliances.

What is the maturity level of your AppSec program?

Using the Forrester assessment, you can measure the maturity of your AppSec program to help identify areas for improvement. Any organization that wants to secure its software should make maturity of its AppSec program its holy grail. Maturity means making security the first thought, not an afterthought. It means embedding security into software throughout the development life cycle, not trying to patch it at the last minute before production.

Hop-by-Hop Visibility

Time is money, especially when it comes to the cloud. Fast resolution of performance issues is a must to ensure business continuity and positive customer experiences. But your network and security teams can’t start working with cloud providers to resolve issues if they’re stymied by blind spots in their efforts to prove network innocence. Every company with a hybrid multi-cloud environment has struggled with visibility in the cloud.

Lookout Helps a Large Construction Firm Protect Intellectual Property Shared Between Employees, Partners and Contractors

Large construction firms rely on a vast network of architects, engineers, project managers, contractors, and suppliers to collaborate on projects of all sizes and complexities. While the digitization of the construction industry has made it easier for these project teams to share information, it also expands the cyber-attack surface.