Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

A battle or a coalition? Proactive vs reactive cybersecurity

Many businesses are starting to investigate proactive vs reactive cybersecurity methods. Reactive cybersecurity strategies have been effective in the past when dealing with incidents and remain relatively effective where known threats are concerned. The problem is that cyber criminals are now aware that businesses are already prepared for known threats and are actively improving and evolving their cyber-attack methods to evade detection.

IABs and RaaS

There are tens of thousands of clandestine pages and forums on the dark web that are not indexed by search engines, so they remain hidden unless the user knows the address in advance. This includes discussion forums where techniques or tools are shared with which cyberattacks can then be launched, but these sites also serve as a black market for buying and selling illicitly obtained data.

Navigating the road ahead for automotive cybersecurity

With challenging cybersecurity requirements on the horizon for automotive companies in 2022, security teams can look to BSIMM12 for guidance. For security teams in the automotive industry, 2021 was an extremely busy year. Cybersecurity became a requirement for market access and compliance, so the entire industry faced a challenging timetable. The security groups in automotive companies are experiencing “forced growth” brought about by rigorous cybersecurity compliance requirements.

Take Control of Your Cloud Security: Introducing Storage Tiering for Microsoft Azure

As organizations deploy more and more cloud native workloads, the ability to protect them in a secure and cost-effective manner is becoming increasingly important. Data access is also more widely spread, making it even more critical to meet this protection need with a secure, logically air-gapped copy of that data.

Devo Channel Chief on the Company's Success, Making the CRN Security 100, and What's Ahead

Gary Pelczar, Devo’s vice president of global alliances, has been named a 2022 Channel Chief by CRN. Gary and his team launched Devo Drive, the company’s partner program for resellers, MSSPs and global systems integrators in 2021. In this post Gary shares his thoughts about the growth of Devo Drive, the value Devo delivers to partners, and what lies ahead.

Malware Civil War - Malicious npm Packages Targeting Malware Authors

The JFrog Security research team continuously monitors popular open source software (OSS) repositories with our automated tooling to avert potential software supply chain security threats, and reports any vulnerabilities or malicious packages discovered to repository maintainers and the wider community. Most recently we disclosed 25 malicious packages in the npm repository that were picked up by our automated scanning tools.

What is Shadow Code and Why Should I Worry?

With constant pressure on web application and software development teams to churn out code for new website tools/features, it makes sense to leverage code depositories and JavaScript libraries to expedite the development process. In fact, code depositories, like GitHub, are so important to the web development process, that the vast majority of organizational websites use them. But code depositories and libraries—whether their internal or external—can hide a danger known as shadow code.

IoT Security: How Important are Logs for System?

IoT has rapidly moved from a fringe technology to a mainstream collection of techniques, protocols, and applications that better enable you to support and monitor a highly distributed, complex system. One of the most critical challenges to overcome is processing an ever-growing stream of analytics data, from IoT security data to business insights, coming from each device. Many protocols have been implemented for this, but could logs provide a powerful option for IoT data and IoT monitoring?