Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Splunk SOAR: Anyone Can Automate

If you haven’t heard the news, Splunk Phantom is now Splunk SOAR – available both on-prem and in the cloud. What does this mean to you? You can deploy SOAR in the way that best supports your business needs. No matter what deployment you choose, you can automate from anywhere, and truly “SOAR your own way!” Hot on the heels of our cloud release is another exciting announcement: Splunk SOAR’s new Visual Playbook Editor.

Three Tactics to Bypass Multi-factor Authentication in Microsoft 365

Microsoft 365 (M365) has quickly become one of the most utilized email platforms and, thanks to a variety of productivity and communication applications deeply embedded in enterprise processes, it’s also a popular target for cyber criminals. Microsoft certainly understands that and has enabled extensive security mechanisms for M365, including multifactor authentication (MFA), which requires users to present more than one form of authentication before login.

Needed: A Secure Shopping Experience Across All Channels

The pandemic hastened long-developing trends toward digitization and decentralization. As virus concerns, social distancing guidelines and convenience pushed people online, ecommerce sales surged, expected to hit $4.2 billion globally this year, jumping ahead by years in the process. To be sure, this isn’t a one-time trend. According to one survey , nearly half of shoppers who altered their shopping habits in 2020 plan to make those changes permanent.

Security Exception vs. Risk Acceptance: What's the Difference?

Businesses face an endless range of security concerns. Internal controls and security procedures help, but not every risk can be managed out of existence. To build a sustainable security program, then, executives need to rely on risk acceptance and security exceptions to keep operations running and to appease stakeholders as best as possible.

What is Vulnerability Testing?

Even the most secure IT system can have vulnerabilities that leave it exposed to cyber attacks. Constantly changing network environments, social engineering schemes, and outdated or unpatched software are all threats that call for routine vulnerability testing. Vulnerability testing, also called vulnerability assessment or analysis, is a one-time process designed to identify and classify security vulnerabilities in a network.

The Importance Of Trust In The Fight Against Ransomware

The industry consensus today is that the only way to reliably end the threat of ransomware for good is to stop paying ransoms. Some have even gone so far as to suggest that they should be banned altogether. But because of a lack of public knowledge and transparency, it’s almost impossible to know the full scale of the problem to understand the right solution.

Highlights from Black Hat USA 2021

Black Hat USA is one of the industry’s oldest and most well-established security events. Last year, the conference was held virtually for the first time in its history. This year’s conference brought together the best of both worlds, with a hybrid event that was held virtually and in person in Las Vegas. Historically, Black Hat has seen about 20,000 attendees at its in-person conference.

Building Java container images without a Dockerfile using Jib

Suppose you’ve been working with container images for more than a minute. In that case, you’re probably familiar with those ubiquitous documents that describe, layer-by-layer, the steps needed to construct an image: Dockerfiles. Did you know that there is a growing set of tools for building OCI compliant images without Dockerfiles?

What are Mobile App Security Standards?

With an increasing overflow of threats and attacks on mobile apps, businesses are now more concerned than ever about making their apps safe and secure for their users. Even the apps which were deemed to be secure and impenetrable are now being crept into with severe vulnerabilities. And this is why there is a huge priority shift happening across the globe towards mobile app security. According to Gartner , the global market for information security is expected to cross a market cap of$170.4 billion.