Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Does Data Privacy Mean to Consumers and Corporations?

January 28 is Data Privacy Day (DPD)! I know, you’re so excited that you’ve got a party planned to get your executives, Marketing and Sales personnel to spend all day reviewing and revising your Privacy Policy (especially now that Privacy Shield is invalid). The general focus of DPD is to inform consumers about the need to maintain the privacy of their data and to assist them in this quest.

How to export and import Timelines and templates from Elastic Security

When performing critical security investigations and threat hunts using Elastic Security, the Timeline feature is always by your side as a workspace for investigations and threat hunting. Drilling down into an event is as simple as dragging and dropping to create the query you need to investigate an alert or event.

Rubrik Recognized as a 2021 Gartner Peer Insights Customers' Choice for Data Center Backup & Recovery Solutions

At Rubrik, every new feature and innovation is developed through our customers’ lens. We are always looking for new ways to work with our customers to truly understand their deepest data management pain points and business objectives. Nothing brings us more joy than hearing that Rubrik brings our customers peace of mind and new value from their backup data.

Why ManageEngine PAM360 is the ultimate privileged access management solution

At ManageEngine, we‘re building one of the most comprehensive and tightly integrated IT management software suites on the market. We have over 90 products and free tools to manage all your IT needs, including Active Directory management, help desk management, desktop and mobile device management, network and server management, application management, IT security, and analytics.

How reliable is real-time security?

Today’s world is a fast-paced one, and that reality means changing the approach to security. Traditional ways of securing networks or premises often involved responding to threats after they happened or preparing for the most likely attacks based on experience. Now, an option called real-time security — or real-time adaptive security — allows people to use a different method.

Detectify security updates for January 25

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more frequently at record speed within 25 minutes from hacker to scanner. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. The following are some of the security vulnerabilities reported by Detectify Crowdsource ethical hackers.

Digital Identity Trends: 3 Forces shaping 2021

We live in a world where our heads are filled with security logins and pockets filled with Identity cards, but since a few years there is another rising star in the world of identity-DIGITAL IDENTITY. What is a digital ID? A digital identity is a set of verified digital attributes and credentials of a person, just like a person’s ID card for the physical world.

Integrating identity: OAuth2 and OpenID Connect in Open Policy Agent

In order to make policy decisions we commonly need to know the identity of the caller. Traditionally this has often been done by providing a user or client identifier along with the request, and using that identifier to look up further information like user details or permissions from a remote data source. While this model works fairly well for many applications, it scales poorly in distributed systems such as microservice environments.