Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Introducing GitGuardian's Advanced Jira Cloud integration

Speed up your remediation workflow with GitGuardian's new Advanced Jira Cloud integration: Users have already been able to manually open Jira tickets from the incident view in the dashboard. Now, you can configure GitGuardian to create a new Jira ticket to track any needed development efforts. You can also configure the Jira tickets to resolve an incident in GitGuardian when a specific status is reached. It will mark the associated incident as Resolved so you can stay focused on other work.

CIS Controls: Everything You Need to Know

The Center for Internet Security (CIS) Controls are a prioritized set of Safeguards to mitigate the most common cyber-attacks against systems and networks. The SANS 20 Critical Security Controls, formerly known as the SANS Top 20, is now called the CIS Controls and has been reduced to 18 Controls since version 8. You may be wondering, How many CIS Controls are there?

Going Backstage with OPA

The huge ecosystem of integrations has over time become a true differentiator for Open Policy Agent (OPA), and an embodiment of the project’s promise to provide policy across the “whole cloud native stack”. Integrating OPA into a new tech stack also tends to be a rewarding experience for developers, which might help explain why so many integrations have been provided by external contributors over the years.

What is HashiCorp Vault and How Does it Work?

With technological advancements, organizations are moving to the public cloud, which has resulted in a major concern: data security. Traditional methods of managing secrets and sensitive information are proving inadequate, especially when there is a high volume of private data. Here comes the need for HashiCorp Vault: a solution that offers a centralized and robust system to safeguard sensitive information. In this blog, we will explore HashiCorp Vault’s purpose, benefits, and use cases.

Why you NEED an Open Source Vulnerability Scanner

Here are 7 reasons why you need an open source vulnerability scanner. ✍️ Resources ✍️ ⏲️ Chapters ⏲️ ⚒️ About Snyk ⚒️ Snyk helps you find and fix vulnerabilities in your code, open-source dependencies, containers, infrastructure-as-code, software pipelines, IDEs, and more! Move fast, stay secure.

Locking Down Security: Disable WDigest Authentication

WDigest Authentication is a method used in Windows operating systems for verifying user credentials during authentication. It’s a way for computers to prove their identity to servers by storing a copy of the user’s plaintext password in memory. It uses Hypertext Transfer Protocol (HTTP) along with Simple Authentication Security Layer (SASL) exchanges for authentication purposes. The name “WDigest” comes from its function and purpose within the Windows operating system.