Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Customizing the JFrog Xray Horizontal Pod Autoscaler

In cloud native computing (Kubernetes in our case), there is a requirement to automatically scale the compute resources used for performing a task. The autoscaling cloud computer strategy allows to dynamically adjust the active number of application servers and allocated resources instead of responding manually in real-time to traffic surges that necessitate more resources and instances.

Webinar: Box, urlscan, Tines: URL analysis & phishing automation

In this webinar, Tines co-founder Thomas Kinsella sits down with Del from Box, and Johannes from urlscan, to take a look at some key use cases running production – URL analysis and phishing. As well as walking through how Box has designed these processes in Tines, we also discuss reflect on what security teams, engineers, analysts, and threat hunters can learn from Box’s approach more generally.

Software supply chain risks to keep an eye on in 2022

As a supply chain security vendor, the growth is far from surprising for us at Bytesafe - with the supply chain being a noticeable security blind spot for many organizations. A massive 62% of organizations claim to have been impacted by supply chain attacks in 2021 alone. Incidents like log4j, ua-parser-js and colors.js/faker.js have once again shown that it’s vital to use services like the Bytesafe Dependency Firewall.

Firewall Analyzer wins Gartner Peer Insights Customers' Choice 2021 award for SIEM

We are excited to announce that Gartner has awarded ManageEngine Firewall Analyzer with the Peer Insights Customers’ Choice award for SIEM for 2021. We are humbled and thank all of our customers who have taken the time to review us on Gartner.

Cloud Penetration Testing Services: How Safe Is Your Business Data?

Businesses are increasingly moving their data and applications to the cloud. While this offers many benefits, it also creates new security risks.#cloudsecurity #cloudpenetration Cloud penetration testing is a process of identifying and exploiting vulnerabilities in a cloud-based system. By identifying these weaknesses, businesses can protect themselves against malicious attacks and ensure that their data is safe

Access Brokers: Who Are the Targets, and What Are They Worth?

Access brokers have become a key component of the eCrime threat landscape, selling access to threat actors and facilitating myriad criminal activities. Many have established relationships with big game hunting (BGH) ransomware operators and affiliates of prolific ransomware-as-a-Service (RaaS) programs.

CrowdStrike Automates Vulnerability Remediation Processes While Enhancing SecOps Visibility

Adversaries are becoming more adept and sophisticated in their attacks. Taking advantage of vulnerabilities present in major software is often an attractive entry point for establishing a campaign within an enterprise environment. The CrowdStrike 2022 Global Threat Report highlights how adversaries continue to shift tradecraft and weaponize vulnerabilities to evade detection and gain access to critical applications and infrastructure.

Even non-developers can fix security vulnerabilities in code at The Big Fix

Here’s the story of how a regular project management task resulted in me opening a pull request to an open source repository on GitHub. As a new member of Snyk’s Marketing team, I was recently involved in the preparation for The Big Fix, an event that brings together developers, DevOps, and security practitioners of all skill levels to help make the internet more secure by fixing vulnerabilities while having fun and being rewarded with swag.