Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Announcing the 2022 State of Open Source Security report from Snyk and the Linux Foundation

Open source software is a key component in modern applications. It has created a new era in software development, promoting a free exchange of ideas within the developer community and enabling developers to build more functional software, faster than ever. Based on most estimates, 70-90% of any piece of modern software includes open source code.

How to detect the containers' escape capabilities with Falco

Attackers use container escape techniques when they manage to control a container so the impact they can cause is much greater. This’s why it is a recurring topic in infosec and why it is so important to have tools like Falco to detect it. Container technologies rely on various features such as namespaces, cgroups, SecComp filters, and capabilities to isolate services running on the same host and apply the least privileges principle.

Uncovering the dark web: What is it and who uses it?

The dark web is the seedy underbelly of the internet. Unlike the surface web, criminals, spies, freedom fighters, and hacktivists can operate anonymously on the dark web, making it a popular place for illicit activity. Legitimate internet users also use it to protect their privacy in a world where people are increasingly mistrustful of digital giants like Google and Facebook. But it’s very easy to accidentally view illegal, dangerous, and traumatizing material on the dark web.

Supply chain impersonation or genuine third-party information request? Here's how to tell.

The last 24 months has seen a steady stream of media attention relating to attacks on the supply chain. The impact is real, as is the cost. We have watched both big name security like SolarWinds and open source such as log4js serve as targets with devastating effects. Quite often the methods used have anecdotally relied on technical means and to a lesser degree social engineering.

I Get Paid to Hack Your Company and These Are the Controls I Hate the Most!

Carlos García and Jeff Macko, two leading security experts from Kroll, provide a unique perspective on hacking and how to address it in this insightful webinar, I Get Paid to Hack Your Company and These Are the Controls I Hate the Most! The session outlines the most effective security controls to prevent and mitigate common types of cyberattacks and emphasizes potential quick wins that can be achieved without the need for significant investment, and how to harness the technology already used by most organizations.

Navigating New Cybersecurity Policies and Regulations: What You Need to Know

2022 has brought in tighter cybersecurity restrictions and privacy regulations around the world. With the escalation of cyber threats due to the accelerated digital transformation and the Russian invasion of Ukraine, governments globally have made decisions to step up their cybersecurity defense and introduce new measures to protect businesses or national security.