Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Selecting the right cybersecurity framework for your organization

The rise in cyberattacks and data breaches demands organizations to implement a well-structured cybersecurity framework. Cybersecurity frameworks provide a set of best practices that organizations should follow to minimize their cyber risk. There are countless cybersecurity frameworks available for organizations to implement. This is why choosing the best framework for your organization can be difficult. Moreover, many mandatory industry and compliance regulations have cross-reference to various cybersecurity frameworks. Understanding the similarities and differences across the common security frameworks can help you create a more robust cybersecurity compliance program for your organization.

JavaScript type confusion: Bypassed input validation (and how to remediate)

In a previous blog post, we showed how type manipulation (or type confusion) can be used to escape template sandboxes, leading to cross-site scripting (XSS) or code injection vulnerabilities. One of the main goals for this research was to explore (in the JavaScript ecosystem) how and if it is possible to bypass some security fixes or input validations with a type confusion attack (i.e by providing an unexpected input type).

How and when to use Docker labels / OCI container annotations

Most container images are built using Dockerfiles which contain combinations of instructions like FROM, RUN, COPY, ENTRYPOINT, etc. to build the layers of an OCI-compliant image. One instruction that is used surprisingly rarely, though, is LABEL. In this post, we’ll dig into labels (“annotations” in the OCI Image Specification) what they are, some standardized uses as well as some practices you can use to enhance your container security posture.

Lookout CASB Protects Sensitive Data in Slack by Masking data and Watermarking

This video illustrates how Lookout CASB can protect sensitive data, such as a social security number, in Slack by detecting the data in chat and masking that data so that it is not shared in plain text. This video also shows how Lookout applies a watermark to sensitive content allowing addition policy actions to be applied.

Zero Trust? Don't Forget Your Mobile Fleet

Does your Zero Trust strategy include mobile devices? If not, it might have a zero chance of being successful. Hear how to deliver continuous authentication for mobile users connecting to corporate data. Speakers: Tomas Maldonado - CISO, NFL Ramy Houssaini - Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas