Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Going beyond "shift left" to extend AppSec in all directions

A week before RSA 2024, Forrester predicted which subjects and themes would come to the forefront of the conference. They emphasized that we’d see a focus on proactive security, defined as “a strategic approach to controlling security posture and reducing breaches through strong visibility, prioritization, and remediation.” I went into the conference with this prediction in mind. However, I was surprised by what I found.

What is NGFW? Next generation firewall VS traditional firewall

Protecting an organization’s network perimeter has become increasingly complex. Traditional firewalls, once the cornerstone of network security, are now being supplemented and often replaced by more advanced solutions known as Next-Generation Firewalls (NGFWs). At Obrela, we believe in leveraging cutting-edge technologies to safeguard digital assets, and understanding the differences between traditional firewalls vs NGFWs is crucial for any robust security strategy.

IP Theft 101: Common Methods, Impact & Prevention

Intellectual property (IP) is the intangible property belonging to a company, such as its designs, creative expressions, inventions, or trade secrets. Intellectual property theft leads to serious financial damage for a company, including decreased business growth and loss of competitive edge. Sometimes, companies aren’t even aware that their IP has been stolen, making tracking IP theft difficult. Even though it’s a federal crime, only a small percentage of all IP theft cases are reported.

Hear It Now: G2 Summer '24 Reports

There is a lot to keep track of these days. Organizations face an array of challenges that can hit anywhere on the spectrum from the mundane to the existential. Heightened security concerns affect how tightly you control user access. The proliferation of devices adds complexity and bloat to your management stack. And almost every organization, regardless of size, is expanding its distributed workforce across global time zones and native languages. Getting this right falls to you as well.

8 Ways to Combat Credential Stuffing and Brute Force Attacks

We’re in an era of connectivity and convenience, but this has also opened the floodgates to a new wave of cyber threats. Among the most insidious and pervasive is credential stuffing, a cyberattack that exploits the human tendency to reuse passwords across multiple online accounts. This threat is more than just a digital inconvenience. Verizon’s 2024 Data Breach Investigations Report reveals that more than 49% of breaches caused by external actors involve stolen credentials.

DDoS threat report for 2024 Q2

Welcome to the 18th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the Cloudflare network. This edition focuses on the second quarter of 2024. With a 280 terabit per second network located across over 230 cities worldwide, serving 19% of all websites, Cloudflare holds a unique vantage point that enables us to provide valuable insights and trends to the broader Internet community.

Bitbucket Exports And Imports Explained

As one of the leading platforms for distributed version control, Bitbucket is a hub that helps DevOps teams collaborate on code. This critical data, including source code, digital data, and we shouldn’t forget metadata that helps them to see the full picture of their work, is vital for their operations and business continuity. So, should they have the possibility to seamlessly import this data from Bitbucket and export to Bitbucket? The answer is yes.

Why Your Business Needs Bot Protection Solution?

Our latest application security report shows a significant rise in bot attacks, jumping from 59.4 million in Q1 2023 to 147 million in Q1 2024—a 147% increase. These automated programs can disrupt services, compromise sensitive data, and threaten the integrity of online operations. To effectively mitigate these risks, businesses must adopt a robust bot protection solution.

Network Isolation for DynamoDB with VPC Endpoint

DynamoDB is a fully managed NoSQL database service offered by Amazon Web Services (AWS). It is renowned for its scalability, dependability, and easy connection with other AWS services. Notwithstanding its manifold advantages, organizations continue to place a high premium on guaranteeing the security of data stored in DynamoDB. By default, DynamoDB can be accessed over the public network using HTTPS, ensuring secure communication with SSL/TLS encryption.