Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Dev-First Prevention Strategies

Security and engineering teams often fail to find a balance between meeting the necessary security objectives for their organization and ensuring maximum velocity. While security teams view the process of blocking new critical severity vulnerabilities as a basic security best practice, engineering teams often push back out of fear that it will create too much friction for their developers. This dynamic is often based on prior experience with legacy security systems that focus almost solely on the needs of security and fail to support developers in this process.

Tracking the transport of radioactive sources with blockchain

This week, Australian authorities recovered a tiny capsule, just 6mm x 8mm (0.24 x 0.31 inches) along a 900km section of Australia’s longest highway, the Great Northern Highway. The pea-sized capsule was a radiation gauge containing caesium-137, a radioactive material with a half-life of 30.05 years, that is used to measure the density and flow of materials in the mining, and oil and gas industries.

Why Bots Threaten Your Cybersecurity

Say what you want about bots, but you have to admire their versatility. Bots do everything from rank Google results and serve up cat photos on your Facebook feed, to sway elections and defraud retailers. Basically, they’re quite flexible. These days, bad bots are big business, with cybercriminals around the world using them to fraudulently access accounts, attack networks, and steal data.

Secrets Need to be Secured Everywhere Not Just in Code Repositories

Organizations are unaware of the prevalence of API keys and secrets throughout their systems, and how their users are sharing and using them. Even with security best practices and policies in place, the lack of awareness or compliance, as well as the possibility of human error means that API keys and secrets need protection regardless of where they are stored or shared.

Difference to Know: Cyber Security, Software Security, Application Security

Did you know that when we talk about online security, cyber security, application security, and software security are all different? Sometimes, software security and application security are used interchangeably. However, there is a key difference between these two; both are different from cyber security. Application security is a more reactive approach and software security, on the other hand, has a more proactive approach.

How to Become a Cybersecurity Analyst [Complete Guide]

A cybersecurity analyst, also known as an information security analyst, specializes in the security of networks and IT infrastructure. The role of cybersecurity analyst has a relatively broad job description, offering great opportunities for individuals looking to enter the cybersecurity industry and branch out into various cyber-related career paths.

Startup and Stability, Surprisingly now in the Same Sentence?

These are uncertain times in tech. If you’re at one of the many companies in the news recently, think back to why you joined. Was it the people? The tech? Or maybe… the perception of a rock-solid, not-going-anywhere, totally-guaranteed position? Things have changed lately.