Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Stranger Danger: Your Java Attack Surface Just Got Bigger

Building Java applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome, you're a cloud native application developer! As developers, our responsibility broadened, and more software means more software security concerns for us to address.

Deeper Dive: Updates to Our Terraform Essential Policy Toolkit

Following up from our previous Kubernetes Essential Policy Toolkit Deeper Dive, we’re excited to announce upcoming enhancements to Terraform use cases in Styra DAS and take a deeper dive into the Styra DAS Terraform policy toolkit. With the enhanced Styra DAS Terraform policy toolkit, we’re making it even easier for platform engineering and cloud infrastructure teams to support their company’s application developers while delivering secure and compliant infrastructure configurations.

Negotiating With Hackers to Unlock Your Data - What You Need to Know!

Are you concerned about the recent ransomware attacks? Tune into this episode to gain valuable insight into the complexities of negotiating with a ransomware group. In this episode, I am joined by cyber security experts, Richard Cassidy and Oliver Rochford, to share their experiences and knowledge to help you understand the impact of ransomware and how best to respond to ransomware groups if you find yourself in that situation.

Malware 101: What It Is, Current Trends, Signs You're Infected & Prevention

Malware refers to any modified script in a software system that aims to cause intentional harm to the victim. The term malware is a portmanteau that blends two words: malicious and software. Let’s take a good look at this bad situation. We’ll review how malware works, alarming stats and trends, signs that you’re likely infected and, most importantly, ways to prevent this malice.

January Cyber Roundup

T-Mobile has once again fallen victim to a massive new cybersecurity breach, discovered on Jan. 5. The company has a history of hacks from recent years, for which it was fined hundreds of millions of dollars. Using weak API security, the attack caused the exposure of the personal data of more than 37 million customer accounts, which was apparently first accessed on or around Nov. 25. The stolen records include addresses, phone numbers and dates of birth.

One Cybersecurity Platform To Rule Them All: Exploring The One Architecture

Enterprises require multiple tools for cyber defense, so network and information security staff often end up managing a patchwork of solutions, a blend of legacy and new technologies. If they find and deploy solutions that solve several business and security problems at once, they can reduce costs, logistics, and headaches while helping the business grow and innovate.

EP 21 - Back to the Cyber Future: Theresa Payton on Evolving Digital Threats (Part 1)

Since the earliest digital days, cyberattackers have targeted identities in their quests for riches, chaos and even revenge. So, what if we could hop into a flux capacitor-equipped DeLorean, hammer-down to 88 mph, and go back in time to better understand how yesterday’s threats influence today’s landscape – and what history can teach us about outpacing adversaries? Today, we do that – and a whole lot more – with a fantastic guest: Theresa Payton.