Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Tines sponsors ten more open source projects

Our activities around sponsoring Open Source are not just limited to projects we rely on; we have also been supporting those that are important to the general Cybersecurity ecosystem and beyond. We're in this for the long haul and the most recent set of projects covers a very wide scope. We want to help ensure that everyone has sustainable Open Source for many years to come. Let's tell you about these new projects and why you should be aware of them.

CISO Insider - S3E2 - Driving diversity in infosec with Lisa Hall

PagerDuty Head of Information Security Lisa Hall joins us on CISO Insider for an in-depth discussion on what diversity in the infosec industry really looks like — not just hiring to meet DEI quotas, but fostering differences to build strengths across the board. Diversity in thought and background among her staff is a success factor for Lisa’s team, and it leads to greater diversity in the work they do at PagerDuty.

January Developer Roll Up

January’s update is a little late but it is only because we are really busy with lots of big things coming. One of things we are looking forward to in the near-term is a webinar with one of our oldest and most valued customers: Soteria - Security Solutions & Advisory Join us this Valentines Day as we recount cybersecurity’s greatest love story and explore how Soteria leveraged their expertise - and the LimaCharlie platform - to create a successful MDR/DFIR business.

Top 10 Uses of Website Vulnerability Scanner Tools

The average cost of data breaches in 2021 was USD 4.24 million, the highest figure in at least 17 years. So, proactive, accurate, and effective identification of security vulnerabilities is non-negotiable and offers a solid basis for adequate security. By proactively identifying these vulnerabilities, weaknesses, and flaws in the application, website vulnerability scanner tools bring accuracy and efficiency in web application security.

Pentest 101: Detect and Prevent Clickjacking with Penetration Testing

Clickjacking is an interface-based attack where the hacker manipulates the CSS of a website to insert a malicious iframe, button, or link which hides behind a seemingly harmless button of link. It takes the user to a malicious page and triggers some unsolicited action on the user's behalf. A clickjacking attack may be used to trigger a malware download, loss of content, or money, among other things. You can detect it with the help of penetration testing.
Sponsored Post

Fix the Broken State of Security with a "Security for all" mindset

Which cultural values empower businesses to thrive today? That's an open question, of course. But I suspect most employees, managers, and analysts would include items like collaboration, transparency, and creativity on the list of essential ingredients in business success. Indeed, you could argue that these values are at the core of a variety of modern organizational and technical innovations, from DevOps (which is all about collaboration) to open source software (which centers on collaboration and transparency) and the creator/maker movement (which is, of course, all about creativity).