Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vital Signs of Software Dependencies: Understanding Package Health

As the vast majority of modern applications rely heavily on open-source software, dealing with updates for dependencies can become a major hassle for both developers and cybersecurity professionals. Every developer knows the pain of an update breaking their application. Manually determining which dependencies to run can become a massive time-suck, which is why many developers fall behind on updates, leaving applications open to vulnerabilities.

Open Source Security for Hardening

OS hardening refers to the process of enhancing the security of an operating system by implementing various measures and practices to minimize vulnerabilities and strengthen its resistance against potential cyber threats and attacks. This involves configuring the OS settings, applying security patches, disabling unnecessary services, and implementing access controls to create a more robust and secure computing environment.

Introducing DeployPilot: Centralize and automate software deployment across all clients

In today’s IT landscape, software deployment and patch management are crucial parts of managed IT services. For MSPs, ensuring that software is installed, updated and maintained across various client environments efficiently, reliably and securely is essential for maintaining smooth operations and customer satisfaction.

Understanding NTLMv1, NTLMv2 and NTLMv2 Session Security Settings

NTLM has three versions - NTLMv1, NTLMv2 and NTLMv2 Session Security. NTLMv2 is supposed to offer better security than its previous version, and to some extent it does provides better defense against relay and brute force attacks, but does not completely block them. NTLMv2 Session Security is a session security protocol that can be used in conjunction with NTLMv1 or NTLMv2 to provide additional security.

How to Use Teleport Machine ID and GitHub Actions to Deploy to Kubernetes Without Shared Secrets

We are living in the era of Kubernetes. It is hard to find anyone who has not heard of it and in all likelihood you are using it, too. And if you are using Kubernetes, it is probably also safe to assume that you areusing CI/CD to deploy your applications into it. However, as CI/CD and Kubernetes have grown in popularity, the number of bad actors looking to exploit weaknesses in them has grown too.