Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

New research: the realities of parenting and growing up online

The internet’s evolution is transforming our way of life in real time. That includes the experience of being a parent, and to an even greater degree, a young person. Today, it’s not uncommon for kids to have an online presence before losing their first teeth. But we’re only just starting to learn about the impact of these changing habits, and the challenges they’re creating for families around the globe.

Digital footprint: All about electronic footprint and how to leave minimal digital trace

Whenever we browse anything on the internet or perform any activity, we leave our trails on the internet. Those trails are digital trails and are called digital footprints. Here we have used the word activities that include everything like visiting a website, sending emails and submitting any information in any online form.

Ruby email rule removed from Snyk Code

Snyk Code supports various languages important in the cloud native arena, Ruby being among them (and we’ve seen great adoption, so thank you!). Our researchers are constantly monitoring our rule sets, using our training set of open source projects, but also — and, yes this is an advantage of a SaaS service — how the rules do on the code that is scanned. Just as a reminder, Snyk does not use your code to train our sets — but we do aggregate usage statistics.

The Middle East's Getting a Little Cloudy: My Thoughts from Gitex 2022

Having lived and worked in Dubai early in my career, I have a great affinity with the Middle East. So when the opportunity to present at Gitex, the region’s premier technology event, and support our local Lookout team, I jumped at it. You might not think of the Middle East as being at the forefront of technological innovation, but if you stroll around Gitex, you’ll find everything from flying cars, robotics, and environment controls to IT and security.

2022 Gartner Magic Quadrant for SIEM: Sumo Logic positioned as a Visionary for the second year in a row

Sumo Logic’s security team is thrilled to be named a Visionary in the 2022 Gartner® Magic Quadrant™ for Security Information and Event Management (SIEM) report. We are honored to be recognized for the second year in a row as a Visionary, which we feel reflects our Completeness of Vision and our Ability to Execute.

ModSecurity Request Body Parsing: Recent Bypass Issues

ModSecurity is an open-source web application firewall (WAF) engine maintained by Trustwave. This blog post discusses multiple input interpretation weaknesses in the ModSecurity project. Each input interpretation weakness could allow a malicious actor to evade some ModSecurity rules. Both ModSecurity v2 and ModSecurity v3 were affected. The issues have been addressed in v2.9.6 and v3.0.8, respectively.

Secure Enclaves: What They Are and What to Look for in a Solution

Cyber threats are ubiquitous these days, and companies are scrambling to find better ways to protect themselves. But in the world of cybersecurity, not all data is equal, which begs the question: What data should I protect? For instance, it’s one thing to protect routine customer orders, but credit card numbers deserve extra protection. Likewise, access to sensitive financial information related to mergers, acquisitions, or IPOs needs to be limited to a small group of people.

Key Takeaways from the Just-Published Gartner Market Guide for Single-Vendor SASE

Secure access service edge (SASE), as an architecture, is only three years old, but rapid adoption by organizations is making SASE one of the fastest-growing technology market categories in history. Functionally, SASE will change—and is already changing—how teams make security and networking technology purchases.

Five tips for managing the cost of your security operations

With the global economy experiencing a slowdown, security teams are feeling the pressure to reduce costs without sacrificing security. But while it's important to be fiscally responsible, making cuts in the wrong areas can put your organization at risk. Malicious actors know that businesses are under even more pressure during times of economic turmoil.