Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

How to improve the cybersecurity of NGOs?

Digital transformation has reached all sectors, including non-governmental organizations (NGOs). These organizations have now become more dependent on technology to improve their ability to deliver and scale programs, engage with beneficiaries, and ensure an agile response to populations in need. Although this transformation delivers many benefits for NGOs, it has made them a viable and attractive target for cybercriminals.

Over 1 Million NextGen Healthcare Patients Data Exposed in Recent Security Breach

NextGen Healthcare is an Atlanta-based healthcare services company that helps hospitals and health practices manage health record data electronically. The company was founded in 1973 and manages data for millions of different patients throughout the United States. With so many patients relying on the same service, this company is a huge security vulnerability since it suffered from a major data breach.

Weekly Cybersecurity Recap May 19

Major data breaches seem to be occurring more and more frequently, and we have some huge names on the list of impacted companies this week, including the US Government, Toyota, and Intel. We were also concerned with services in our hospitals and our schools being breached, giving up patient, student, and teacher data in the process through the breach of companies like SchoolDude and NextGen Healthcare.

Teleport Team

Teleport Team is the latest SaaS offering from Teleport. Teleport Team is designed to secure your infrastructure with safe, short-lived, and secretless access. It's an ideal solution for startups, rapidly expanding businesses, or even hobbyists who want to fortify their infrastructure without the hassle of deploying, updating, or maintaining a Teleport Cluster. Starting at just $15 per monthly active user with 50 included protected resources.

Learn about Corelight and Zeek with AI

Want to know how to get a commanding view of all devices that log onto your network? Let’s ask ChatGPT! Watch as Corelight's James Pope leverages his AI assistant to explain the power of Zeek®—the open-source technology behind Corelight’s network evidence—and the detailed logs of network activity it produces, including protocols such as HTTP, DNS, and SSL. In the video he also shares how Zeek®’s open standard easily integrates with Suricata, SecurityOnion, Molok, Elk, CrowdStrike EDR logs, and more.

Starting With Snyk: an overview of the CLI onboarding flow

When starting with Snyk, users can import projects via Git repository or utilize CLI to run test their application code locally or via CI/CD. In this video, we will discuss the onboarding flows meant to help new users utilize the CLI to run their first source code (SAST), open source (SCA), container and infrastructure as code (IaC) tests and start fixing issues. Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.

Code Signing with USB Tokens: A Comprehensive Guide

USB, hardware, or cryptographic tokens are portable devices that securely store cryptographic keys. These tokens typically connect to a computer or other devices via USB. USB tokens offer a compact and convenient solution for storing and protecting sensitive cryptographic keys, certificates, and other credentials. They are designed to provide strong encryption, tamper-resistant hardware, and secure key storage.

Setting up the Docker image scan GitHub Action

Nowadays, the final product of most Git repositories is a Docker image, that is then used in a Kubernetes deployment. With security being a hot topic now (and for good reasons), it would be scanning the Docker images you create in the CI is vital. In this piece, I’ll use GitHub Actions to build Docker images and then scan them for security vulnerabilities. The Docker image built in the CI is also pushed to GitHub’s Docker registry.

How a Password Manager Enhances Productivity

People who don’t have a password manager often struggle with forgetting their passwords and having to reset them when attempting to log in to their online accounts. This is frustrating, time-consuming and leads to a loss in productivity. A password manager enhances your productivity since it remembers passwords for you, aids you in generating strong passwords and autofills your login credentials, saving you time to focus on more important tasks.