Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Splunk SOAR Playbooks: Suspicious Email Domain Enrichment

Despite the myriad pathways to initial access on our networks, phishing remains the single most popular technique for attackers. The open nature of email and our reliance on it for communication make it difficult for defenders to classify messages, so it is no surprise that suspicious email investigation is a top use case for automation. Today, we are releasing a new community playbook for Splunk SOAR (previously Splunk Phantom) to help enrich suspicious email events.

Navigating Cloud Adoption Myths And Misconceptions

Cloud computing is the vehicle with which modern enterprise organisations drive their digital transformation initiatives. Cloud adoption provides an opportunity for organisations to progress their digital transformation initiatives, scale rapidly and develop their digital service offerings with reduced time and cost overheads, resulting in more agile and efficient working practices and increased value to customers.

Detect application abuse and fraud with Datadog

Protecting your applications from abuse of functionality requires understanding which application features and workflows may be misused as well as the ability to quickly identify potential threats to your services. This visibility is particularly critical in cases where an adversary finds and exploits a vulnerability—such as inadequate authentication controls—to commit fraud.

5 IT security strategies that you should think about as employees return to the office

Without a doubt, digital transformation accelerated amid the pandemic and made it possible for employees to work remotely. However, it also intensified the threat landscape created by malicious attackers who jumped on the first opportunity to attack the more vulnerable home networks. As remote working becomes the new norm, it is paramount to have an agile infrastructure and team for security. Companies need to manage and orchestrate appropriate remediation activities carefully.

Snyk uncovers malicious code activities in open source supply chain security on the npm registry

Open source helps developers build faster. But who’s making sure these open source dependencies (sometimes years out of development) stay secure? In a recent npm security research activity, Snyk uncovered a total of 8 npm packages which matched a specific malicious code vector of attack. This specific attack vector of the malicious packages included packages which had pre/post install scripts, which allowed them to run arbitrary commands when installed.

3 Realistic Ways to Drive Better Networking-Security Team Collaboration

The success of a Secure Access Service Edge (SASE) architecture depends on how well networking and security teams, and the products and services they manage, converge into a shared set of priorities tied to business objectives. Unfortunately, new research from Censuswide confirms this network-security team collaboration is still strained—if not downright combative—at a majority of enterprises.

5 Things Every MSP Should Know About Data Governance

For a managed service provider (MSP), answering questions about data governance—specifically data security and privacy—is a vital part of the job. Understanding the complexities of content management systems, automation, and more ensures you are at the top of the data security field. Maintaining file and data security is a fact of life—usually by force of law. However, it’s a subject not many of your clients will ever fully understand.

Data Management and Governance: A Primer for Life Sciences Companies

The COVID-19 pandemic increased the need for cross-company collaboration. Yet, working with external partners shouldn’t mean giving away company secrets. Now, information security is more vital than ever. Proper data management and governance are good ways to control access to your files, protect secure information, and maintain compliance with all industry laws and regulations.

GitHub DLP Remediation Guide

GitHub is a code versioning tool, which means that it preserves a full history of searchable code changes. Sensitive data can proliferate in these code changes and is not always easily discoverable. Credentials & secrets that are hard-coded in GitHub repositories pose risk if repos are leaked or accessed via social engineering attacks, as they can provide access to infrastructure, databases, and third-party APIs. Likewise, sensitive data like customer PII can end up in code repos.

Now available: Nightfall DLP safeguards sensitive data in Confluence

The Atlassian suite makes remote collaboration easy and efficient for distributed teams. Confluence, one of Atlassian’s best known and widely used apps, is a flexible and customizable wiki solution that can host almost anything for a company. From software documentation and process docs to hosting meeting notes and project plans, the possibilities for what your team can do in Confluence are endless.