Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

UK Election - The Hacktivism Perspective

The UK General Election marks a monumental time in UK politics. There has been a lot of internal tension regarding the future of the Conservatives, with a large majority of individuals voting to ensure that the party did not continue its 14 years in power. On 5 July 2024, Labour won the General Election in a major landslide victory for the party, putting them in power for the first time since 2010.

Playing Around with AWS-Vault for Fun & Profit

AWS-Vault is an excellent open-source tool by 99Designs that enables developers to store AWS credentials in their machine keystore securely. After using it for a while at Jit, I decided to dig deeper into how it works and learned a lot along the way. In this article, I will summarize and simplify the information I learned to help others with their aws-vault adoption and lower the barrier to usage.

How to Backup Active Directory: A Step-by-Step Guide

Microsoft Active Directory (AD) is the primary authentication service used by a majority of organizations worldwide (roughly 90 percent). It stores critical business information on domain controllers (DCs) like user accounts, their permissions, the number of computers in your organization’s network, etc. In other words, it’s critical infrastructure. However, many businesses still don’t understand just how important it is to back up Active Directory.

9 Social Engineering Attack Examples to Watch Out For

Social engineering attacks have become increasingly sophisticated and diverse in today's digital-first world. Attackers have a toolbox full of tactics to manipulate individuals and organizations into revealing sensitive information or granting unauthorized access. By understanding the different types of social engineering attacks, you can better protect yourself against these manipulative techniques.

Why Is Manual Testing a Thing of the Past?

Before end-to-end (E2E) testing frameworks, the software development industry struggled with fragmented and inefficient testing methods. Testing was manual, labor-intensive, and prone to human error, which limited testing coverage and left many critical issues undetected until later stages of development. This manual approach relied heavily on developers and testers executing test cases by hand, leading to substantial inefficiencies and incomplete test coverage.

How to Compare the Effectiveness of PII Scanning and Masking Models

When evaluating models or products for their ability to scan and mask Personally Identifiable Information (PII) in your data, it's crucial to follow a systematic approach. Let’s assume you have a dataset with 1,000,000 rows, and you want to scan and mask each row.

When to Use Retrieval Augmented Generation (RAG) vs. Fine-tuning for LLMs

Developers often use two prominent techniques for enhancing the performance of large language models (LLMs) are Retrieval Augmented Generation (RAG) and fine-tuning. Understanding when to use one over the other is crucial for maximizing efficiency and effectiveness in various applications. This blog explores the circumstances under which each method shines and highlights one key advantage of each approach.

Multi-Cloud Security: Proven Methods for Safeguarding Data

As organizations increasingly adopt diverse cloud services to meet their varying computational and storage needs, multi-cloud security emerges as a critical concern. “In 2024, a majority of organizations (78%) are opting for hybrid and multi-cloud strategies. Of those organizations, 43% use a hybrid of cloud and on-premises infrastructure, and 35% have a multi-cloud strategy,” according to the 2024 Fortinet Cloud Security Report.

Support for AWS Nitro Enclaves on Fireblocks

At Fireblocks, we know that our customers employ a variety of different cloud configurations for their own internal systems. That’s why we’re excited to announce that Fireblocks now supports Amazon Web Services (AWS) Nitro Enclaves. With this new development, Fireblocks customers building products on AWS can now utilize Nitro Enclaves to run their Fireblocks API Co-Signer.

Why Do You Need Cloud-Based DDoS Protection?

The cloud offers unparalleled flexibility and scalability, from data storage to maintaining an online presence. However, this increased reliance on cloud infrastructure also brings heightened risks, particularly from DDoS attacks. Recent incidents underscore the urgent need for robust DDoS protection. For instance, the HTTP/2-based DDoS attack peaked last August, reaching over 398 million requests per second.