Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Need for Next-Generation Web Application Firewalls (WAFs) in Modern Threat Landscape

In today’s ever-evolving threat landscape, organizations face numerous security challenges that necessitate a shift from traditional web application firewalls (WAFs) to next-generation solutions. This article aims to highlight the failures of traditional WAFs, contrast them with the capabilities of next-gen WAFs, and emphasize the crucial need for API security in the current digital ecosystem.

Troubleshooting: Service Running Without Required Privileges in BDRSuite Backup Server

In this video, we will walk you through troubleshooting the "Service Running Without Required Privileges" alert in BDRSuite Backup Server, BDRSuite Remote Proxy, and BDRSuite Agent (KB ID: 117000). This alert typically occurs when these services are not running with administrator privileges, which are necessary for installing the BDRSuite Delegation Service (BDS) for Hyper-V backups and the BDRSuite Backup Agent (BBA) for Disk Image and Files & Folders Backup.

A Secure VPC as the Main Pillar of Cloud Security

In 2019, the Capital One breach led to the exposure of 100 million customers’ personal data due to a misconfigured WAF. The incident ultimately cost Capital One over $270 million in fines and compensation, demonstrating the serious risks inherent in cloud security and highlighting the urgent need for robust security measures. As cloud adoption accelerates, public cloud services spend is expected to jump 20.4% versus 2023, reaching $675.4 billion this year.

Going beyond the standard: Announcing the State of Trust Report 2024 and VantaCon agenda

Building and scaling trust has become more difficult for organizations of all sizes. With more reliance on third-party vendors and AI technologies, security leaders face an increasingly complex threat landscape. However, many teams are left to manage this complicated landscape with screenshots, spreadsheets, and legacy solutions that rely on manual updates and limit them to point-in-time visibility into their security posture.

CSI Forensics: Unraveling Kubernetes Crime Scenes

This is the second episode of the CSI Container series, published and presented at CloudNativeSecurityCon 2024. In this episode, we focus on Kubernetes CSI, how to conduct DFIR activities on K8s and containers, and how to perform static and dynamic analysis. As we covered in the first episode, DFIR refers to the union of Digital Forensics (DF) and Incident Response (IR). We also highlighted how conducting DFIR activities in a container environment differs from the usual DFIR in a host environment.

How Calico Helps with PCI Compliance for Containers and Kubernetes

The Payment Card Industry Data Security Standard (PCI DSS) is a global standard designed to ensure the security of cardholder information. It is crucial for any organization that stores, processes, or transmits payment card data to comply with PCI DSS to protect the integrity and confidentiality of cardholder information.

Four Ways to Streamline Your Security Review Process

Security reviews of third-party vendors are now an essential element of an effective governance, risk, and compliance (GRC) function. After all, there have been numerous examples in recent years of organizations with an otherwise strong security posture falling victim to threats that originated with supply chain partners. But whether you are on the sending or receiving end of a security review, completing the process can be time-consuming and inefficient.

External IP Addresses to Include in Pentest: Best Practices for Security Testing

Carrying out a pentest correctly is important for finding and fixing security holes in a company. Including useful external IP addresses is an important part of pentesting. Hackers can get into a company's network and possibly take advantage of vulnerabilities by using these addresses as entry points. Companies can make sure their pentests are thorough and useful by carefully choosing and ranking which external IP addresses to test.