Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Your Guide to the Latest Email Fraud and Identity Deception Trends

There’s a high chance that you or someone you know has been impacted by email fraud or identity theft. At the very least, you’ve likely received a variety of spam emails and text messages asking to provide a payment or confirm your identity. The good news is that cybersecurity protection is constantly evolving and improving, with cybersecurity education programs preparing skilled professionals to enter the front lines against cybercrime.

The EU Cyber Resilience Act - Thinking Out Implementation

From TVs to watches, fridges, lightbulbs, or coffee machines, it seems everything needs to be connected now to be marketable. The Internet of Things (IoT) environment is growing in homes and workplaces, but it has established itself way ahead of regulation. IoT devices do not currently have to comply with any specific cybersecurity standards and malicious actors are already making use of these endpoints.

6 Developer Personas Every Security Practitioner Needs to Understand

When it comes to engaging developers for a successful application security program, it is helpful to understand the types of developers you are working with. While of course each developer is a unique individual, there are some common personas I have come across in my work with development teams. In fact, as a developer in prior jobs, I have embodied some of these traits myself. Let’s dive in.

DDoS Attack Cost Bandwidth.com Nearly $12 Million- How to Protect Your Site Against One?

Recent years have witnessed a sharp surge in DDoS attacks, and the cost of attack is also steadily increasing. SMEs spend, on average, $120k per attack. As more and more businesses move to the cloud, it is essential to be aware of the risks associated with DDoS attacks. The cost of DDoS attacks can affect your company’s bottom line as it can shut down its infrastructure, applications, communications, and other vital services.

Sedara Named to MSSP Alert's Top 250 MSSPs List for 2022

The list and research identify and honor the top MSSPs (managed security service providers) worldwide. The rankings are based on MSSP Alert’s 2022 readership survey combined with the site’s editorial coverage of MSSP, MDR and MSP security providers. The sixth-annual list and research track the MSSP market’s ongoing growth and evolution.

Image Scanning with GitHub Actions

Scanning a container image for vulnerabilities or bad practices on your GitHub Actions using Sysdig Secure is a straightforward process. This article demonstrates a step-by-step example of how to do it. The following proof of content showcased how to leverage the sysdig-cli-scanner with GitHub Actions. Although possible, it is not officially supported by Sysdig, so we recommend checking the documentation to adapt these steps to your environment.

Talent Acquisition digital transition crisis - Why Identity Verification is the solution?

Talent acquisition is a planned process of identifying, assessing, and acquiring new employees. It starts with the intent to hire the best-performing resource in the industry. It is a carefully curated technique to fetch the best talent for organizational growth. And unlike general recruitment, it focuses more on quality over quantity. Lately we have seen the growth of personnel being hired online, from the process of selecting the employees to the interview are all managed and processed online.

8 cybersecurity practices for back-to-school classrooms

For the education sector, data security ranges from the need to protect devices to safeguarding the sensitive information and privacy of its users, including students, their parents, and the institution's staff. Taking into account the current context in which educational centers operate, which involves combining remote learning and in-person teaching, as well as the use of personal devices, we analyze the most common cybersecurity threats affecting the sector.