Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Ultimate Guide to Hardening User Account Control Settings & Boosting Windows Security (2024)

User Account Control (UAC) plays a crucial role in Windows security by mitigating the risk of malware. It accomplishes this by restricting the capacity of malicious code to run with administrator privileges. The CIS benchmark 2.3.17 for User Account Control (UAC) specifically addresses the security configuration settings related to UAC on Windows operating systems. We will discuss in this blog CIS benchmarks for.

How Jaguar Land Rover and Asda are Building a Modern DevSecOps Culture

Organizations at different stages of growth or maturity will have different challenges when adopting a modern DevSecOps program. In this session we talked with Mike Welsh, Lead Enterprise Security Architect DevSecOps, at JLR, and Ruta Baltiejute, DevSecOps Lead at Asda, about their differing approach to implementing a secure development model at their organizations. We discussed the significant differences between how they’re building software today, including their approach to change in People, Process and Tooling.

What is DAST (Dynamic Application Security Testing) 60 sec explainer

Discover the Power of DAST in Cybersecurity | Dynamic Application Security Testing Explained In the digital age, cyber threats are a constant concern. Protecting your organization's data and systems is paramount, and that's where DAST (Dynamic Application Security Testing) comes into play!

What Existing Security Threats Do AI and LLMs Amplify? What Can We Do About Them?

In my previous blog post, we saw how the growth of generative AI and Large Language Models has created a new set of challenges and threats to cybersecurity. However, it’s not just new issues that we need to be concerned about. The scope and capabilities of this technology and the volume of the components that it handles can exacerbate existing cybersecurity challenges. That’s because LLMs are deployed globally, and their impact is widespread.

Are you looking for vulnerabilities in the right places?

With the rapid pace of technological evolution, ensuring security within the systems we operate and the software we deploy has never been more crucial. In the world of vulnerability management, we’ve moved from scanning Linux hosts to scrutinizing container images. However, are we looking for vulnerabilities in the right places?

BoxyHQ 2023 Changelog: Enhancing Security with Retraced-Powered Audit Logs

BoxyHQ's audit logs are powered by Retraced which, in the true spirit of open source, is also a collaboration between us and Replicated. While this project did not have the same level of activity as SAML Jackson, it is a critical component of our offering and we are excited to share some of the highlights from 2023. Instead of doing a list by quarter, for this one we will just do a list of notable new features, fixes, and changes in chronological order starting in February 2023.