Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

2022 in Review: 4 Lessons We've Learned from 2022's Largest GitHub Breaches

2022 revealed that security challenges remain for organizations leveraging GitHub. Between supply chain attacks, API key leaks, and other security risks, there are plenty of lessons and takeaways from this year’s GitHub-related headlines. In this post, we’ve rounded up and categorized the year’s largest GitHub stories. Read on to learn more about the types of security risks occurring in GitHub and the lessons you’ll want to take with you into 2023 and beyond.

3 cybersecurity strategies for healthcare leaders in a digital-first world

From on-demand healthcare services like telehealth to wearable technologies, predictive healthcare to blockchain technologies for electronic health records, or 5G for healthcare services to AI and augmented reality for state-of-the-art medical treatments, the healthcare industry is at an inflection point. These digital transformations also bring along elevated cybersecurity risks.

How and Why LimaCharlie Secures Google Chrome and ChromeOS

Chrome is the world’s most popular web browser—and ChromeOS is becoming more prevalent due to the use of Chromebooks in education and other sectors. In this blog post, we’re going to talk about what this means for security teams, and how LimaCharlie can be used to secure Chrome and ChromeOS.

How to handle Node.js file uploads with Fastify

File uploading is a commonly needed functionality in web applications. Because of this, many web frameworks provide ways to allow server-side applications to accept files and work with them. This is the same with Fastify, which is a Node.js web framework that is often regarded as a successor to Express. It’s fast and highly focused on providing the best developer experience with a powerful plugin architecture and the least overhead possible.

Using Snyk reporting for data-driven security

Last month, we announced the open beta of Snyk’s new and revamped reporting. Since then, we’ve been amazed at how creative our customers have been in leveraging these new capabilities to answer all sorts of different security questions. We’re not surprised. The new reporting was designed to provide easy access to data across the Snyk platform (including Snyk Code!), and to give customers flexible analysis tools to slice and dice data as they see fit.

How to Prepare for Critical Infrastructure Security Threats

As part of our 2-Minute Security Talks series, Bob Thompson, Associate Managing Director in Kroll’s Security Risk Management practice for EMEA and APAC, addresses the threats to critical national infrastructure that are emerging from global geopolitical instability. Bob also discusses how Kroll can support organizations with threat monitoring, security reviews, risk assessments, cyber resilience assessments and crisis preparedness, and reviews the seven key points of Kroll’s risk assessment process that can help companies mitigate threats.

Do More with Splunk Security Essentials 3.7.0

We know the time between Thanksgiving and New Year’s is typically slow so we wanted to bring some early holiday cheer to you through the most downloaded (and free) app on Splunkbase, Splunk Security Essentials (SSE). Starting Dec. 7, Splunk Security Essentials 3.7.0 is Generally Available. We have some amazing updates in the SSE 3.7.0 release, so let’s dive right into the updates.

A Useful Cybersecurity Guide Made Specifically for Small Businesses

Starting a small business can be a challenging task. You become responsible for many things simultaneously, such as handling different business operations, establishing partnerships with others, paying salaries and taxes, and trying to profit from your products or services. The last thing you want to occur is a cyberattack on your business. Some people believe that cyberattacks aren’t a huge threat to small businesses.

Modern Enterprises Require End-to-End Visibility

If you have a single vendor, single cloud homogenous network where everything is documented, you know where every device is, and you know all the possible paths in your network, then you are a networking deity. Realistically, nobody has a “simple” and fully documented network. Mainly because enterprises grew over time with the organization.