Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Is Kubernetes Observability and Why It's Critical for Securing Your Clusters

Kubernetes observability refers to the ability to monitor and diagnose the performance and behavior of a Kubernetes cluster and its applications. This includes monitoring resource usage, tracking the status of pods and deployments, and identifying and troubleshooting errors. Observability tools for Kubernetes typically include metrics, logging, and tracing capabilities.

Public or Private Cloud: Choices to Consider

Organizations are progressively moving towards a predominantly cloud-based computing environment. What this means is that essentially all of their back-end infrastructure, systems, and client-facing applications can be accessed and distributed through the cloud. Modern cloud computing goes a step further than simply being present in a virtual environment.

What is Microsoft EV Code Signing Certificate?

Developing an application is not a cakewalk. A lot goes into making sure that the development of the app occurs without any complications. From the development to the testing of the app, every process must be conducted with utmost precision to beat any risks of inaccuracy. That is why a developer must be confident about creating an application that is successful. However, that is not the only consideration to make.

What Is MAS TRM?

All financial institutions operating in Singapore are required to comply with the MAS TRM guidelines in order to operate legally. In order to ensure the safety of their operations, customers, as well as the wider financial system, financial institutions are required to conduct regular risk assessments and implement appropriate risk management measures.

What is Slowloris DDoS Attack and How Does it Work?

Slowloris is a type of DDoS (Distributed Denial of Service) attack that exploits web servers to handle incoming connections. In a Slowloris attack, the attacker sends many HTTP requests to the target web server, but unlike a regular DDoS attack, the requests are sent slowly over a long period of time. The attack sends incomplete HTTP requests to keep the connections open for as long as possible. The attacker then mimics this pattern by sending many incomplete requests to the server.

7 Battle-Tested Tips for Using a DAST Scanner

While modern web applications are growing in complexity, the threat landscape is also constantly evolving. It can be difficult for developers to identify and remediate vulnerabilities in their code, especially if they need more expertise in security. As a result, manual application security testing has become ever more challenging and intricate.

Why You Shouldn't Turn Off 2FA

You shouldn’t turn off your Two-Factor Authentication (2FA) because it removes the extra layer of security it adds to your account, making it easier for cybercriminals to compromise it. Keep on reading to learn why 2FA should be left enabled for your online accounts and why it should be added to your accounts if it isn’t already.

Cybersecurity Insights from The World Economic Forum in Davos: Part II

On the final day of the World Economic Forum, we shared SecurityScorecard’s five key cybersecurity insights based on the discussions that dominated our time in Davos, Switzerland. Several weeks later, after gathering our thoughts from everything we saw, heard, and contributed to in Davos, we’d like to expand on our cybersecurity perspectives from the Forum and provide five additional insights.

Secure your Kubernetes clusters with the Kubescape Docker extension

Container adoption in enterprises continues to grow, and Kubernetes has become the de facto standard for deploying and operating containerized applications. At the same time, security is shifting left and should be addressed earlier in the software development lifecycle (SDLC). Security has morphed from being a static gateway at the end of the development process to something that (ideally) is embedded every step of the way. This can potentially increase the effort for engineering and DevOps teams.

Fortinet Patches Critical RCE Vulnerabilities in FortiNAC and FortiWeb

On Thursday, February 16, 2023, Fortinet patched two critical unauthenticated remote code execution vulnerabilities, one impacting FortiNAC (CVE-2022-39952) and one impacting FortiWeb (CVE-2021-42756). Both vulnerabilities were discovered by Fortinet’s Product Security team.