Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

The Lemontech story - GitGuardian customer stories

A few weeks ago, we had the pleasure of exchanging with Ezequiel Rabinovich, Lemontech's CTO, about how his teams use GitGuardian to protect their repositories. Lemontech is a company developing software for the legal industry based in Santiago, Chile. It serves more than 1,300 customers in Latin America. Ezequiel supervises a team of about 30 developers and 4 DevOps engineers for approximately 150 employees. They use GitHub for source control management, and their organization has 350 repos, 130 of which are active.

Waseda University Enables Universal Secure Remote Learning and Digital Transformation with Cato

“I see Cato SASE as a tool for digital transformation promotion. We can use it to reorganize our entire security portfolio, reduce costs, and bring out the best in our students, professors, and administrators. Being able to work productively and securely anywhere gives a great boost to all our digital transformation initiatives.” - Hitoshi Kusunoki, Information Planning Department, Waseda University.

Perform thorough packet filtering in real time with deep packet inspection to prevent hidden threats and attacks

Deep packet inspection (DPI), as the name suggests, is a type of network packet filtering and an advanced mode of examining network packets. In DPI, network packets that are transmitted through an inspection point are evaluated. At this inspection point, a DPI tool determines where the packets came from, whether a service or application. With DPI, packets are categorized, inspected, and redirected to prioritize business-critical applications and other online services.

Exploiting Weak Active Directory Permissions with PowerSploit

Adversaries use multiple techniques to identify and exploit weaknesses in Active Directory (AD) to gain access to critical systems and data. This blog post explores 3 ways they use PowerShell PowerSploit to elevate or abuse permissions, and offers effective strategies for protecting against them.

Beware of Agreement Fraud: Scammers Targeting CEO's with Agreement Draft

Introduction: Fraudulent campaigns aimed at top-level executives through phishing are on the rise. In this technical blog post, we will delve into a particular type of CEO phishing scam that employs an attachment containing an agreement draft. We will examine the attack's technical aspects and suggest preventive measures that businesses can adopt to safeguard themselves.

Examples of Digital Signatures & Certificates for Organizations

Digital signature certificates are a must-have for any organization interested in ensuring the authenticity of its data and transactions. As a software developer, you can use them to sign software updates or as a sales manager to authenticate contracts. Digital signature certificates are the ultimate guarantee of security and validity. Digital signature certificates provide a secure and reliable way to verify and authenticate data.

Cloud Identity Security: It Doesn't Taste Like Chicken

There’s a scene in the original “Matrix” movie when Neo is sitting in the grimy kitchen with the rest of the crew and eating gray, runny slop. No matter what new version of gray slop they eat, they always seem to think that it tastes like chicken. When confronted with something new, it’s a natural human trait to relate it back to something we already know.