Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Machine Learning APIs for Web Developers

Machine learning (ML) used to be a tool limited to specialized developers and dedicated teams. Now, thanks to many web service providers and approachable tooling, your applications can use pre-build learning models and machine learning techniques the same way you would use any web service API. This is a quick way to test out and benefit from machine learning without having to invest in artificial intelligence, building your own learning models, or shaping your application around ML.

Derbyshire Fire & Rescue Service: Fighting cybersecurity fires with Splunk

Everyone at Splunk is very proud of the amazing things that our customers and partners do with their data. It is always extra special when one of those organisations is really doing good and looking after us all in our daily lives. I’m delighted to share one of those stories from the Derbyshire Fire & Rescue Service (DFRS) who is using Splunk as its data-driven SIEM.

Splunk Security Essentials 3.1: Enhanced MITRE ATT&CK Matrix: Find the Content that Matters the Most to You, Faster

One of the great things about developing for Splunk Security Essentials is that most of the features and capabilities are requested from customers and the security community. In this latest release (3.1), we added a feature that has been requested frequently: the ability to filter the ATT&CK Matrix for Cloud and SaaS Techniques. The MITRE ATT&CK Framework consists of multiple matrices such as Enterprise, Mobile, and ICS.

COSO-Based Internal Auditing

Internal audit and compliance departments benefit from having a comprehensive framework to use to perform corporate risk assessment and internal control testing as well as fight fraud. The most popular framework is the COSO Framework. The Committee of Sponsoring Organizations of the Treadway Commission (COSO) was originally formed in the United States in 1985 to combat corporate fraud.

Building Secure Go Projects with Free Vulnerability Scanning in VSC Code

Go 1.13 introduced important security features to Go Modules including a checksumdb that verifies that your dependencies haven’t been tampered with. While the integrity of the data can be verified this way - Go Modules can still have security vulnerabilities. Join this webinar to watch a technical walkthrough on how to keep your Go Modules secure.

Disruption on the horizon

Innovations in technology have been a prime agent for disruption throughout much of human history. Advancements in materials science gave English archers, with their superior longbows, the advantage over the French in many conflicts during the Hundred Years War; such as the Battle of Agincourt. In the late 2000’s, the music industry was forced to reinvent itself in the face of changing consumer consumption models as a result of technological advancements or become irrelevant.

Create Login Scripts with Selenium

In this video, you will learn how to use the Selenium IDE plugin to create a login sequence script that enables Veracode Dynamic Analysis to scan URLs that have form-based authentication. Veracode Dynamic Analysis delivers an automated capability to scan your web applications based on the URLs that you provide. If your website uses form-based authentication (a more complex login procedure than a user name and password, such as a token key or two-step authentication), you must upload a login script to your Dynamic Analysis so that Veracode can log in to application.