Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Introducing GitGuardian Honeytoken

We are proud to introduce you to the GitGuardian Honeytoken module. Honeytokens are decoy credentials that don't allow any real access but instead trigger alerts that reveal the IP address of whoever tried to use them. GitGuardian honeytokens can be used for intrusion detection in your own environments and tools. You can also plant our honeytokens in your SaaS vendors' systems to be alerted if a core vendor in the supply chain has been compromised. Placing honeytokens in your source code help you detect when your code has been leaked publicly, indicating a code leak.

Tanium XEM adds a new Digital Employee Experience (DEX) solution area to the platform

At the Tanium Converge World Tour in London, Tanium announced its new Digital Employee Experience (DEX) solution area. In this video Gabe Knuth, Senior Analyst at the Enterprise Strategy Group (ESG) and Stephanie Aceves Tanium’s Senior Director of Product Management talk about the DEX market and what to expect in the Tanium’s new DEX solution area.

How to Avoid Common Cybersecurity RFP Pitfalls: Part 1

At Trustwave, we see scores of requests for proposal (RFP) in all shapes and sizes, originating from nearly every conceivable industry, seeking solutions to their specific security challenges and desired business outcomes. To help those issuing the RFP and the vendor on the receiving end, I’ve drawn up some simple guidelines to follow that will help your RFP process run smoothly.

Polaris integrations: Secure development at the speed of business

Digitalization means you need to build more complex software than ever before – the Polaris Software Integrity Platform® can help. Whether you’re building software to run your business or selling software to other businesses, you’re relying on technologies like cloud computing, continuous integration/continuous deployment (CI/CD), microservices, and APIs to enable speed and agility in application development.

Supply Chain Security: Secrets and Modern Security Frameworks (Part III)

In this final part, we'll discuss more software supply chain security frameworks and the critical role of secrets detection in them. We'll explore the NIST SSDF, SLSA, and OSC&R frameworks and how they cover the topic of secrets in software supply chain security.

Lessons from OpenSSL vulnerabilities part 1: Preparing your supply chain for the next critical vulnerability

It's early in the morning on an unseasonably warm Tuesday in October. You're checking your email as you enjoy your first cup of coffee or tea for the day, and you almost do a spit-take when you read that OpenSSL has a forthcoming release to fix a CRITICAL vulnerability. Immediately, visions of Heartbleed pop into your head.

Nearly 500,000 Bank of America Customers Hit By Data Breach on Debt Collector

Bank of America is a massive worldwide financial institution that works with hundreds of thousands of customers. The organization relies on NCB Management to collect debts and manage past-due accounts. A recent data breach at NCB Management compromised nearly half a million Bank of America customers and may have put them at risk from fraud and identity theft. Get the details about this attack to learn what potential damage may have occurred and what you can do about it if your data is involved.

Dissecting Buffer Overflow Attacks in MongoDB

Towards the end of 2020, a new vulnerability in MongoDB was found and published. The vulnerability affected almost all versions of MongoDB, up to v4.5.0, but was discussed and patched appropriately. The vulnerability, CVE-2020-7928, abuses a well-known component of MongoDB, known as the Handler, to carry out buffer overflow attacks by way of null-byte injections.

How Financial Services Organizations Can Achieve Compliance and Reduce Cyber Risk

The financial services industry is undergoing a sea change in how it does business. Today their customers expect 24×7 access, self-service convenience, apps that eliminate the need to visit brick-and-mortar locations, and always-available customer service accessed via phone, email, and the internet. Making things even more challenging, financial sector leaders are embracing cloud technologies to save costs, support real-time analysis, and offer more personalized customer experiences.