Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Signs You've Been Targeted for DDoS BotNet Recruitment

Cybercrime can take many forms, and the criminals behind such attacks work with increasing sophistication — even to the point that some companies may, unwittingly, be helping criminals launch attacks against other organizations. For example, botnets are an organized network of infected devices at a hacker’s disposal, which the hacker then uses to carry out cybercrime schemes by harnessing resources available to the bots on the system.

Leveraging Artificial Intelligence for Impactful Cybersecurity

Artificial intelligence (AI) is reinventing the trajectory of cybersecurity and fighting with a double-edged sword. If harnessed correctly, AI can automatically generate alerts for emerging threats, detect new types of malware, and protect sensitive data. While it has advanced us into a plethora of new technologies -- think Siri, facial recognition, and Google’s search engine -- it has also probed us with significant threats from cybercriminals.

Cybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the Year

With thousands of tools and technologies to choose from, navigating through cybersecurity categories and technologies to find a solution that meets your organization’s needs can be challenging. The annual Cybersecurity Breakthrough Awards program helps you solve that problem by aiming to perform the most comprehensive evaluation of cybersecurity companies and solutions on the market today and recognizing the leaders.

How MongoDB built a successful security champions program

We recently spoke with Amy Berman, Security Strategic Operations Lead at MongoDB about the role of security champions at her organization. For those new to the concept, security champions are developers that have an interest in security and can facilitate collaboration between development and security teams.

Malware analysis: Hands-On Shellbot malware

Malware analysis is a fundamental factor in the improvement of the incident detection and resolution systems of any company. The Sysdig Security Research team is going to cover how this Shellbot malware works and how to detect it. Shellbot malware is still widespread. We recorded numerous incidents despite this being a relatively old and known attack that is also available on open Github repositories.

Five Pillars of a Powerful Security Awareness Program

It seems that we might be getting to the tipping point in the corporate world where most organizations and businesses recognize they’re exposed to an increasing amount of cybersecurity risk. And with bad guys devoting a large portion of their strategy to targeting employees, the need for effectively training employees is intensifying. But before you begin to evaluate or build a program you need to first define and cement what it is you are looking to accomplish with your program.

Secure your infrastructure from code to cloud

Infrastructure as Code enables you to take ownership of your cloud environments and define what your application needs in a programmatic way. It's appealing because it’s code; you can version it, you can automate testing it using pipelines and you can deploy it frequently on your own. However there is a catch. With this level of autonomy comes increased responsibility and the implicit requirement to have the relevant knowledge needed in order to design and configure secure infrastructure.

Benefits and Risks of Social Media

Social media can be a great way to stay connected with friends and family, but it also poses risks. In this blog post, we will explore the dangers of social media for kids, teens, individuals and businesses as well as the benefits. We will talk about the social media risks and how to protect yourself from them. There are many ways that you can reduce your risk when using social media sites like Twitter or Facebook.