Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Top Threats You Need to Know to Defend Your Cloud Environment

The CrowdStrike eBook, “Protectors of the Cloud: Combating the Rise in Threats to Cloud Environments,” reveals how adversaries target and infiltrate cloud environments and recommends best practices for defense. As organizations move critical applications and data to the cloud, these resources have come under increasing attack.

Detecting suspicious activity on AWS using cloud logs

AWS offers a large spectrum of services and compute. The “shared responsibility” model in cloud presents a simplified structure of organization responsibilities and cloud provider responsibilities. Generally, identity and access management (IAM), applications, and data form the dividing line, but lines blur depending on the given cloud service the organization is consuming. This is true of all cloud providers, including the AWS Shared Responsibility Model.

What is data integrity? Types, examples and how to maintain

In the present age, when data has become a significant aspect of every business application, more pieces of information have been stored and processed. The security and quality of that information are vital to protect the health of the data throughout its lifecycle. Implementing measures that preserve the integrity of the data is increasingly vital for organisations around the world.

RKVST (Jitsuin) SCITT Demo from 2019

Supply Chain Integrity, Transparency, and Trust... all in one platform. A little throw-back here...all the way to 2019! SCITT is a hot area right now in 2022 but this is what we've been doing since the beginning. We were even still called Jitsuin :-) This is a very quick run through how making supply chain evidence available to all authorised partners in a supply chain as quickly as possible with Provenance, Governance, and Immutability guarantees can boost trust, reduce risk, and speed operations.

What is SCITT and how does RKVST help?

SCITT in the information security context stands for “Supply Chain Integrity, Transparency, and Trust”. It’s a relatively young discipline and the dust is still settling over its scope and definition but the core is very simple: risk vests in the operator of equipment, but it originates at every point in the supply chain.

7 Things You Should Know About Verizon DBIR 2022 and How Arctic Wolf Can Help

The Verizon Data Breach Investigations Report (DBIR) is an annual publication that provides an analysis of information security incidents, with a specific focus on data breaches. Verizon has been publishing this report on an annual basis since 2008.

Build a holistic AppSec program

What does it mean to build a holistic AppSec program? Learn what’s involved in a holistic approach and how to get started. Digital technology is the centerpiece of modern life today. All around us, technology is transforming business operations from end-to-end, from digital-first businesses to those simply updating existing processes. According to Gartner, 65% of executives report that they accelerated the pace of their digital business initiatives in 2021.

5 Common Types of Mobile Fraud & Mobile Fraud Prevention Tactics 2022

A medical lab scientist landed in Johannesburg on Saturday, February 5th, for his two-week assignment. Soon after landing, family and friends called him to say that some people were calling and texting them, looking for him. Those people were hackers, who had got hold of his contacts. The scientist didn’t pay much attention to it, but two days later he received a message from his telecom company that they had received a SIM card swap request from him, which he, of course, never made.

How to Leverage Self-Service Peer Benchmarking to Manage and Measure Your Software Security Program

It is not hard to set application security goals. Security teams want to reduce risk. Developers want to quickly meet the requirements of security policy and hit deadlines. Executives want growth within their risk tolerance. What is hard is defining an appropriate level of risk and measuring whether your AppSec program is efficient, effective, and returning expected outcomes based on your investments.