Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is SAML? SAML Authentication & Security Assertion Markup Language Explained

Authentication and authorization are two processes that play a significant role in any web application. These concepts ensure that only trusted individuals are granted access to the resources of the application. Plus, with all the web applications and services we use regularly, it is increasingly difficult to manage credentials for multiple user accounts. SAML technology provides a means for securely logging into multiple applications using a single set of credentials.

OneNote documents have emerged as a new malware infection vector

In February 2022, Microsoft disabled VBA macros on documents due to their frequent use as a malware distribution method. This move prompted malware authors to seek out new ways to distribute their payloads, resulting in an increase in the use of other infection vectors, such as password-encrypted zip files and ISO files.

Building a Kubernetes purple teaming lab

Kubernetes, and containerization in general, has a wealth of benefits for many teams operating cloud-native applications. From a threat detection standpoint, however, it is often difficult for newcomers to this space to gain the relevant hands-on experience without trampling over production environments. The Sumo Logic team has previously authored articles on Kubernetes DevSecOps vulnerabilities and best practices as well as Kubernetes logging and monitoring.

How You Can Save Time During a SOC 2 Audit

POV: an important prospect requires all of their partners to get a SOC 2 audit. You’ve just met with your auditing firm and you’ve been tasked with evidence collection, which sounds like tracking down a lot of people and documents. No one can tell you when the RFP knowledge base was last updated. The sales team is asking how long it will take, and can it go faster? You sit back and wonder the same thing: is it possible, and if so, how?

SafeBreach Coverage for US-CERT Alert (AA23-129A) - Snake Malware

The Cybersecurity and Infrastructure Security Agency (CISA) shared the findings of an investigation by numerous cybersecurity agencies worldwide on May 9th, exposing the malicious cyberespionage operations carried out by the Russian FSB utilizing the “Snake” malware. The US-CERT Alert (AA23-129A) Hunting Russian Intelligence “Snake” Malware provided information about this investigation and takedown (along with attacker TTPs and IOCs).

CISO Health and Wellness: An Unconventional Solution to a Systemic Challenge

At a swanky steak house on Manhattan’s Upper West Side, I sat with 100 other security professionals in a dimly lit wood-panelled room, its walls lined with photographs of famous and near-famous patrons. Nearly all of us were at least one cocktail into our evening of high gustation, storytelling, and network building. (Old Fashioneds were the drink of choice that evening).

ROI Matters: Fuel Your Organization's Growth with a Mature Cybersecurity Program

Being a cybersecurity practitioner 15-20 years ago sometimes made me the unpopular guy in the room. People are always excited about financial gain – opening new lines of business, developing creative and sustainable revenue streams – you know, the fun stuff. But nobody wanted to talk about cybersecurity-related financial losses at that time – especially not potential losses due to risks that very few people understood yet.

Artificial intelligence might be insulting your intelligence

It’s Saturday morning. You’ve decided to sleep in after last night’s bender, and you can’t be bothered about the sound of your phone ringing. You decide to brush it off and go back to sleep, but the phone won’t stop ringing. You wake up and scan your surroundings. Your wife’s missing. You let the phone ring until it’s silent and bury your head in your pillow to block out the splitting headache that’s slowly building up. A single message tone goes off.

Ultimate Security Checklist to Launch a Mobile App in South America - iOS & Android

With mobile phones accounting for over 60% of website traffic in 2022, launching a mobile app in South America will be an astute decision. The future lies with smartphones and tablets, making it essential to move beyond traditional desktop solutions. But, did you know- In the first half of 2022, 10,666 ransomware signatures were found in Latin America, as against 5,400 in the last half of 2021.