Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

What is SAML and why you should care

In today's digital world, secure authentication is not just a necessity; it's a cornerstone of trust between services and their users. Navigating the complexities of SAML and implementing robust single sign-on (SSO) solutions can be daunting for many organizations. This document explores the critical role of SAML in enhancing web security, the challenges businesses face in adopting it, and introduces BoxyHQ's streamlined approach to simplifying this process, making advanced security accessible to all.

How SQL Server Audit is Your Secret Security Weapon

The SQL Server Audit object gathers individual occurrences of server or database-level actions and sets of actions for monitoring purposes. This audit operates at the SQL Server instance level, allowing for multiple audits per instance. Upon defining an audit, you designate the destination for result output. Before beginning a SQL Server audit pay attention to the limitations and restrictions associated with database audit specifications.

Unlocking Efficiency with Enterprise SSO: A Unosecur Case Study

Unosecur is a cybersecurity firm focused on protecting cloud infrastructures against identity threats. Their platform offers real-time analysis to visualize and understand cloud permissions, aiming to eliminate access risks. Trusted by cloud-native companies, Unosecur ensures comprehensive identity security through continuous monitoring, malicious activity tracking, and automated remediation with a no-code approach.

Snyk & ServiceNow

Did you know that up to 90 percent of modern software uses open source software? Often SecOps, AppSec and IT teams don’t have a complete view of their application security risk across the organization. The Snyk and ServiceNow integration efficiently finds, prioritizes, and tracks vulnerabilities in open source dependencies to get a complete view of your application security posture and drive smarter, faster fixes in ServiceNow workflows.

Beyond the noise: runtime-based vulnerability management for effective threat control

In an ideal world, patching every vulnerability before attackers discover them would be a breeze. The reality of the evolving cloud-native landscape, with its ever-changing mix of cloud, DevOps, mobile, and critical infrastructure, paints a different picture. New risks emerge constantly, leaving traditional vulnerability management approaches struggling to keep up. Meanwhile, Security and DevOps teams face ongoing pressure to protect their organizations from vulnerabilities.

Secrets Management vs Secrets Detection: Here's What You Need to Know

As the name might imply, it’s important to keep secrets secret. Access to even the smallest of secrets can open a window for attackers who can then escalate their access to other parts of the system, allowing them to find more important secrets along the way. Poor practices can leave many secrets lying around unprotected and just one seemingly unimportant secret can lead to a broad security breach.

Modernizing Access to Mitigate Security Risk and Speed Threat Response

Organizations face increasing risk of data breach, with threat actors taking aim at credentials and standing privileges. So what can companies do to protect their infrastructure? Join Melinda Marks, Practice Director of Enterprise Strategy Group (ESG), Ev Kontsevoy (CEO), and Sasha Klizhentas (CTO) of Teleport to explore.

Teleport Starts Issuing CVEs

Teleport is an open source company. We develop in the open, including full disclosure of security issues in our changelogs and pull requests. We share our penetration tests and key compliance reports. Despite this, our communication to open source users and integration with automated security tooling needed improvement. We needed a standardized way to refer to our vulnerabilities so that when two people (or systems) talk about a vulnerability, they know they’re talking about the same thing.