Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Achieving continuous compliance with Tripwire's Security Configuration Manager

Security and compliance are often tightly intertwined. The main difference is that sometimes security can outpace compliance efforts. While it is easy to infer that a more secure system exceeds a compliance requirement, an auditor should not be expected to deduce the state of a system; the evidence needs to be clear. There are many factors that can cause compliance shifts.

Critical insights into Australia's supply chain risk landscape

Australian organizations find themselves navigating a minefield of supply chain risks, with a surge in incidents stemming from multi-party breaches. These breaches are often caused by vulnerabilities in cloud or software providers and are emerging as a challenge that demands attention and proactive strategies. From July to December 2023, 483 data breaches were reported to the Australian Information Commissioner (OAIC), up 19% from 407 between January and June of the same year.

Coralogix Alarms: Faster than WAF IP Detection and Remediation

There is one area of technology that requires the fastest possible response time, where every second has potentially enormous implications – security. Coralogix fits the security use cases elegantly for a simple reason. It’s very, very fast. Coralogix alarms fire faster than any of our competitors. When benchmarking our closest competition, whose alarms responded in around 2-4 minutes, we left them behind with a median trigger time of 10 seconds across log alerts.

Step-by-Step Guide to Creating Issue Templates in GitLab

Managing software projects is often like trying to solve a puzzle when some of the pieces are missing. That’s where GitLab issue templates come in. Issue reports don’t have to be riddles anymore because with GitLab issue templates, all of your reports will be clear and complete. It’s all about getting it right the first time! These templates are like your time savers. They reduce the back-and-forth of issues, allowing you to focus on fixing the issue rather than trying to comprehend it.

Software Supply Chain Attacks: Notable Examples and Prevention Strategies

Supply chain attack is a kind of cyberattack which targets the network that is made up of suppliers, vendors, contractors and other business partners that organizations rely on to provide goods and services. As opposed to directly attacking a target organization’s systems or infrastructure, attackers use supply chain vulnerabilities to gain unauthorized access or compromise the integrity of products or services.

What is Infrastructure as Code Security (IaC) - Risk, Challenges & Best Practices

In recent years, Infrastructure as Code (IaC) has emerged as a game-changer for managing IT operations. By enabling teams to define and manage infrastructure using codes, IaC offers numerous benefits, such as increased agility, scalability, and consistency. However, along with the advantages, some unique security challenges also arise that must be addressed promptly. Here in the blog, we’ll explore the best practices to maintain the integrity and reliability of the Infrastructure.

Detect malware in your containers with Datadog Cloud Security Management

Detecting malware in container environments can be a major challenge due to the rapid development of malicious code, the proliferation of insecure container images, and the multilayered complexity of container stacks. Staying ahead of attackers means tracking the constant evolution of malware and rooting out threats in your codebase at the expense of considerable compute.

Detect and stop unauthorized cryptomining in your cloud workloads with Datadog CSM Threats

Cloud environments are susceptible to a wide variety of cyberattacks, making them difficult to secure. Some cyberattacks are easier to detect than others, so a priority in cloud security is having adequate detection and response systems in place to mitigate them. Unauthorized cryptomining has become a prevalent threat in recent years, especially in cloud environments where it can be harder to detect.

Fastly's Andrew Santell on going from the Navy to Netflix and breaking free of bad processes

In this episode of The Future of Security Operations podcast, I'm joined by Andrew Santell. Andrew is an experienced security leader who worked for the U.S. Navy for over a decade before moving into the private sector. In 2021, he founded the Security Operations program at Netflix, and recently, he joined edge cloud platform Fastly, where he is the Director of Security Operations and Cyber Defense.

Navigating the Complexities of Transaction Approval and Validation Flows

Designing a blockchain-based product requires extensive planning in order to deliver a compelling set of features with the best possible user experience. Every aspect of the product matters – from the user interface to the backend logic in the codebase. However, important security and compliance vectors tend to slip through the cracks. This blog post aims to offer a new perspective on enhancing your blockchain product’s design and architecture by incorporating some key elements.