Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Prioritizing Cybersecurity Throughout All Web Development Sprints

No one doubts the importance of cybersecurity in web development — and yet, often in the development cycle, we neglect to prioritize it across each sprint and into the final product. Making cybersecurity a priority throughout every development sprint cycle is necessary to combat the tide of digital attacks threatening the modern web. But how can you ensure your focus on cybersecurity throughout development?

How to Take Care of Yourself When Things Go Wrong: Self-Care Tips When Dealing with a Cyber Attack

One very predictable part of cybersecurity is that the work is unpredictable. here are routines that help to create a predictable rhythm, but you don’t necessarily know when the next attack will come, how intense it will be when it does, or when you will get to go back to a predictable and hopefully manageable rhythm again.

How does sensitive information end up in observability platforms?

Observability (logs, traces, metrics) is a core tenet to building strong software systems. Logs are used to debug issues and check on system activity, traces provide valuable insights into system performance and architecture, and metrics allow engineering teams to closely track business metrics within their systems.

NIST vs ISO Compliance: What's the Difference?

As businesses and health organizations seek to strengthen cybersecurity, they’re turning frequently to compliance frameworks to help prioritize, guide, and improve decision-making and implementation. Two of the more popular compliance frameworks are the NIST CSF and the ISO 27001. For IT teams seeking to better understand the difference between these frameworks, as well as which is the ideal tool for their business, here’s what to know.

Quick Guide on FedRAMP Fundamentals

The federal government enacted the FedRAMP regulation in December 2011 to enable executive agencies and departments to use an assessment method based on risk and cost-effectiveness when adopting cloud technologies. A FedRAMP readiness assessment is mandatory for cloud products and solutions providers seeking to receive an Authorization to Operate (ATO). FedRAMP ATO indicates that a provider’s hosted information and systems meet FedRAMP requirements.

How to Write YAML file for Kubernetes?

Though Kubernetes has grown in popularity, it still has a steep learning curve that can make it hard to adopt the technology. Those who can’t get past this initial hurdle are often left behind in the fast-paced field of software development. This article will introduce YAML files for Kubernetes object configuration. YAML provides a way to declaratively configure your Kubernetes applications, and these declarative files allow you to effectively scale and manage your applications.

Introducing Devo Cloud Security Monitoring Detections

In our increasingly cloud-centric world, security teams are under pressure to perform effective cloud security monitoring to defend against fast-moving threats. That’s why Devo is pleased to announce the availability of approximately 50 cloud security detections for Amazon Web Services (AWS) to our Security Operations application. The new detections enable organizations to monitor their cloud infrastructure, look for areas of risk, or respond to threats as they emerge.

New Kroll threat landscape report highlights persistent cyber threats

Created by threat intelligence specialists from Kroll and Redscan, the new report, Q4 2021 Threat Landscape: Software Exploits Abound, explores key insights and trends from over 3,200 cyber incidents handled worldwide in 2021. In early December 2021, Redscan’s analysis of the National Vulnerability Database (NVD), the Common Vulnerability Database (CVD) repository of the U.S.

The new wave of phishing with the Omicron variant

With the outbreak of the pandemic, companies and institutions around the world have fallen prey to cybercriminals who have lured their victims through COVID-19. During the first four months of 2020, INTERPOL detected 907,000 cases of spam emails, 737 malware incidents, and 48,000 malicious URLs, all received by just one company, using coronavirus as bait.

Ransomware, Immutability, And All That Jazz

There’s no denying it: ransomware is now big business. Entire supply chains exist where organized criminals specialize in one or more parts of the crime. The growing popularity of Ransomware-as-a-Service significantly lowers the technical bar of entry for cybercriminals. Some specializations include gaining access to credentials, penetrating hosts, identifying data, delivering encryption payloads, and accepting and distributing the ransom money.