Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

How to export and import Timelines and templates from Elastic Security

When performing critical security investigations and threat hunts using Elastic Security, the Timeline feature is always by your side as a workspace for investigations and threat hunting. Drilling down into an event is as simple as dragging and dropping to create the query you need to investigate an alert or event.

Rubrik Recognized as a 2021 Gartner Peer Insights Customers' Choice for Data Center Backup & Recovery Solutions

At Rubrik, every new feature and innovation is developed through our customers’ lens. We are always looking for new ways to work with our customers to truly understand their deepest data management pain points and business objectives. Nothing brings us more joy than hearing that Rubrik brings our customers peace of mind and new value from their backup data.

Why ManageEngine PAM360 is the ultimate privileged access management solution

At ManageEngine, we‘re building one of the most comprehensive and tightly integrated IT management software suites on the market. We have over 90 products and free tools to manage all your IT needs, including Active Directory management, help desk management, desktop and mobile device management, network and server management, application management, IT security, and analytics.

How reliable is real-time security?

Today’s world is a fast-paced one, and that reality means changing the approach to security. Traditional ways of securing networks or premises often involved responding to threats after they happened or preparing for the most likely attacks based on experience. Now, an option called real-time security — or real-time adaptive security — allows people to use a different method.

Detectify security updates for January 25

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more frequently at record speed within 25 minutes from hacker to scanner. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. The following are some of the security vulnerabilities reported by Detectify Crowdsource ethical hackers.

Digital Identity Trends: 3 Forces shaping 2021

We live in a world where our heads are filled with security logins and pockets filled with Identity cards, but since a few years there is another rising star in the world of identity-DIGITAL IDENTITY. What is a digital ID? A digital identity is a set of verified digital attributes and credentials of a person, just like a person’s ID card for the physical world.

Integrating identity: OAuth2 and OpenID Connect in Open Policy Agent

In order to make policy decisions we commonly need to know the identity of the caller. Traditionally this has often been done by providing a user or client identifier along with the request, and using that identifier to look up further information like user details or permissions from a remote data source. While this model works fairly well for many applications, it scales poorly in distributed systems such as microservice environments.

Docker for Node.js developers: 5 things you need to know not to fail your security

Docker is totalling up to over 50 billion downloads of container images. With millions of applications available on Docker Hub, container-based applications are popular and make an easy way to consume and publish applications. That being said, the naive way of building your own Docker Node.js web applications may come with many security risks. So, how do we make security an essential part of Docker for Node.js developers?