Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

A More Insightful, Proactive Approach to Employee Monitoring

Also known as “bossware” and even “employee surveillance”, employee monitoring has been placed in the bucket of technologies that companies force on their employees. Whatever you call it, its use is on the rise and it looks like it’s here to stay. As of 2022, 60% of companies use some kind of software to monitor employees. General productivity isn’t the only justification for implementing employee monitoring.

Visualizing RBAC for Improved Security Management and Outcomes

RBAC management is crucial to securing a Kubernetes cluster and ensuring compliance with regulations and industry standards. ARMO Platform includes an RBAC visualizer allowing administrators to see which privileges are assigned to any given user. Role-based access control—commonly known as RBAC—is the practice of assigning access to an organization’s resources whereby the level of access privilege depends upon an individual’s role in the organization.

Three Levels of Change: Approval, Purpose, and Careful Monitoring

I logged into one of my online accounts today, and the entire interface was different. At first, I checked to make sure that I was actually on the correct site. Once I confirmed that, I just accepted that the company who runs the software made changes that would improve the performance and functionality of the software. Once I logged in, I noticed that even the desktop icon had changed.

What Are Parameter Tampering Attacks?

APIs will continue to drive business and accelerate digital transformation this year to the extent that nearly no other technology can; according to the 19th Developer Economics survey by Slashdata, almost 90% of all developers use APIs. This makes them a target for attackers who aren’t afraid to engage in any tactic, especially tried-and-true methods like parameter tampering attacks - malicious API attack traffic surged 117% from 2021 to 2022.

Crystal Bay Casino Gets Hit By a Cyber Attack Exposing Gambler Data

Crystal Bay Casino is a gambling establishment located in Lake Tahoe. The facility includes slots, table games, and sports betting and features a small hotel known as the Border House for gamblers to stay in luxury. This luxury casino was recently hit by an attack on its IT servers, and its customers may have had their confidential information exposed in the attack. Learn about the full scope of the attack and how the casino is responding to this incident to protect its customers.

The Cybersecurity Excellence Awards Trifecta - Earning Gold x3

It’s our own version of the triple crown! Salt Security has won gold in not one, not two, but three categories in the 2023 Cybersecurity Excellence Awards! It’s like being at the Oscars and winning Best Picture, Best Actor, and Best Director! Check out our award announcement! This year, Salt won highest honors for: Being recognized as the top solution for API security means a lot to our team.

ADAudit Plus User Logon Reports, Part 5: Detect users' last logon times on workstations

ManageEngine ADAudit Plus is a UBA-driven auditor that bolsters your Active Active (AD) security infrastructure. With over 250 built-in reports, it provides you with granular insights into what’s happening within your AD environment, such as all the changes made to objects and their attributes. This can include changes to users, computers, groups, network shares, and more.

Featured Post

How Businesses Can Stay Safe From Undetected Cyber Attacks

Despite the growing awareness of the necessity for more advanced cyber security, firms are still falling foul of attacks which are undetected when they arrive and can stay for years. Adam Blake, CEO and Founder of ThreatSpike discusses the reasons why businesses are missing the mark and how they can keep one step ahead of cyber-attacks.