Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Best practices for monitoring GCP audit logs

Google Cloud Platform (GCP) is a suite of cloud computing services for deploying, managing, and monitoring applications. A critical part of deploying reliable applications is securing your infrastructure. Google Cloud Audit Logs record the who, where, and when for activity within your environment, providing a breadcrumb trail that administrators can use to monitor access and detect potential threats across your resources (e.g., storage buckets, databases, service accounts, virtual machines).

Use Open Source freely without compromising on security or agility

WhiteSource provides a powerful yet simple solution for companies that need to secure and manage their open source components in their applications. As the only enterprise-grade solution that is focused exclusively on open source management, WhiteSource is trusted by the 25 of Fortune 100 companies.

Open Core vs Proprietary SaaS (which to bet your startup's life on?)

Gravitational COO, Taylor Wakefield, presents at the 2019 Open Core Summit, comparing Commercial Open Source Software ("COSS" aka, Open Core Software) to Proprietary SaaS. This presentation discusses why SaaS emerged, why COSS is now emerging and looks at the S-1 data of recently IPO'd companies in each cohort to validate the assumed benefits of each model.

Automated Incident Response with SOAR

Cybersecurity incidents are the norm of the day. No organization has impunity. When a cybersecurity incident occurs, incident responders have to immediately respond to contain the incident and mitigate the damage. To this end, they have to execute the Incident Response Processes (IRP). Doing it manually is expensive and time-consuming and also less effective if your organization is facing too many incidents on a weekly or monthly basis.

3 Regulatory Compliance Trends That Are Accelerating in 2020

A growing attack surface and the exponential rise of data has opened the floodgates for breaches, leading to increased scrutiny by regulatory agencies. It’s not surprising that in recent years, regulators have had to double down with compliance mandates that are more stringent and punitive than ever before.

Featured Post

The Importance Of Cloud-based Security For Businesses

Cloud computing is the transmission of information technology services through the internet. Cloud computing is classified as public, private, or hybrid. These services are now popular with many businesses and governments, hence the need for security measures to ensure data safety and applications in the cloud. Cloud-based security involves the technology and series of procedures implemented to protect cloud computing environments from cybersecurity threats. This form of protection is necessary for small businesses, medium-sized corporations, and large organizations. Here are some of the crucial benefits of cloud-based security.

Hiding in plain sight: HTTP request smuggling

HTTP request smuggling is increasingly exploited by hackers in the wild and in bug bounty programs. This post will explain the HTTP request smuggling attack with remediation tips. HTTP request smuggling is an attack technique that abuses how two HTTP devices send requests between each other (typically a front-end proxy or a HTTP-enabled firewall and a backend server) or chaining multiple servers together with different configurations.

Detect reverse shell with Falco and Sysdig Secure

Reverse shell is a way that attackers gain access to a victim’s system. In this article, you’ll learn how this attack works and how you can detect it using Falco, a CNCF project, as well as Sysdig Secure. Sometimes, an application vulnerability can be exploited in a way that allows an attacker to establish a reverse shell connection, which grants them interactive access to the system.