Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Redacting Message Fields for Privacy Purposes

Many organizations today have strict data privacy regulations that they must comply with. These privacy regulations can often clash with the requirements of security, application and operations teams who need detailed log information. At Graylog, many of the organizations who use our tool are logging sensitive data that may contain personally identifiable information, health related data or financial data.

Automating compliance processes with Tines

As organizations strive for more nimble operations through digital transformation, many are taking a hybrid cloud approach. But ensuring proper security and adhering to compliance regulations can prove difficult - especially at scale. Compliance frameworks may shift annually, making the process of achieving and maintaining compliant procedures intensely laborious, with frequent retraining cycles involving significant time and investment.

What are the Best Code Signing Practices?

Software is responsible for connecting everything by running millions of lines of code- whether it is your workplace, home, or virtually anywhere. If you are a software developer or publisher, you already know how important it is to get a Code Signing certificate for all the software you develop. It helps the users authenticate the software’s publisher or source and get an assurance that the signed software has not been subjected to alteration since its signing.

Beware a Swarm of Scams this Holiday Season

Call her Linda Leesburg. Fresh out of graduate school and starting her first serious job, she decided to buy some kitchen utensils and related items, including a dish set, cookware, silverware and a coffee maker, to outfit the kitchen of her new apartment. She could easily buy these products at a local store, but she discovered a store online that offered them at an unusually low price.

The Benefits of Multi-Factor Authentication

Multi-factor authentication is important for online security. It helps protect your accounts from being compromised by unauthorized users by adding an extra layer of security. There are several benefits to implementing multi-factor authentication such as reducing password risks and meeting regulatory compliance. Read on to discover more about the benefits of using multi-factor authentication in your everyday life and business operations.

OWASSRF: CrowdStrike Identifies New Exploit Method for Exchange Bypassing ProxyNotShell Mitigations

CrowdStrike Services recently investigated several Play ransomware intrusions where the common entry vector was suspected to be the Microsoft Exchange ProxyNotShell vulnerabilities CVE-2022-41040 and CVE-2022-41082. In each case, CrowdStrike reviewed the relevant logs and determined there was no evidence of exploitation of CVE-2022-41040 for initial access.

SOAR'ing to Success: How a Major US Bank Streamlined their SOC

According to the 2022 IBM Cost of a Data Breach Report, the global average cost of a data breach is $4.35 million. Data breaches in the US are even more costly, averaging over $9 million. However, it isn’t just the big players caught in the line of fire. IBM’s report also found that 83% of companies will experience a data breach soon, meaning financial institutions of all sizes — from local credit unions to Fortune 500s — are at risk.

In 2023, What Trends Will Dominate Cybersecurity?

‍ 2022 has been quite the year in cybersecurity. For the first time in a long while, I’m seeing positive developments in the space, including improved cybersecurity education for end-users and adoption of IT Security protection by smaller organizations. As a Cybersecurity Evangelist, education is extremely important to me. So I’ve combined my 2023 cybersecurity predictions with practical resources that you can review now to improve your cyber preparedness.

Building an application security battle plan: Home Alone edition

The holiday season is the perfect time to rewatch some favorite festive movies! While some prefer their holiday movies to be as sappy as possible (Hallmark, we’re looking at you), others relish the annual opportunity to watch an 8-year-old boy exact his revenge on two bumbling bad guys in the 1990 classic Home Alone.