Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top 10 Most Common Software Supply Chain Risk Factors

Imagine a world where a single line of code, tucked away in a common library or framework, could bring your entire digital world to a screeching halt—welcome to the ever-evolving landscape of software supply chain security. Like any supply chain, the security of your software is only as strong as the weakest link in the system that produces and delivers working code.

2023 Guide to Digital Banking Fraud Detection & Prevention

About ten years ago, a new generation of banks entirely transitioned to digital operations. Neobanks, which are banks that only do business online and have no physical locations, cater to specific consumers’ demands by providing more convenience and reduced transaction costs. However, for these newer, online-first institutions, digital banking fraud can be particularly difficult.

Valentines Day Dating Scams Warning

With Valentines Day being today, it’s important to look at the risk factors as well as celebrating the occasion. This time of year is the ultimate peak of online scams from catfishing to identity theft and many more. It’s crucial to be aware of these scams and how they are calculated. This blog & podcast covers the top common online dating scams and how to identify them.

RADIUS server authentication: Old but still relevant

A radius server uses a network protocol for remote user authentication and authorization. It is a client/server protocol that allows a remote user to access a network using a shared secret (usually a password). RADIUS servers are typically located on the perimeter of a network and use port 1812 (UDP) or 1645/1813 (TCP).

There's a New and Potentially More Dangerous Arrow in Cupid's Quiver

It’s Valentine’s Day and love is in the air. Flowers, candy, cards and dinner are some of the classic ways we show our love on this day. But as an increasing number of people look for love online, it’s a good time for a reminder that more people lose more money in online romance scams than in any other fraud category. According to the FBI, over the past five years $1.3 billion in losses have been reported, with annual losses skyrocketing since the pandemic.

GitHub's Jacob DePriest: How to attract and retain more diverse security talent

In this episode of Future of Security Operations, Thomas speaks with Jacob DePriest, VP & Deputy Chief Security Officer at GitHub, a company with a mission "to help every developer - regardless of experience level - learn, code, and ship software effectively." Before joining GitHub, DePriest spent more than 15 years as a senior executive at the National Security Agency (NSA) in the US.

Why K-12 Schools Need Cybersecurity Help from E-Rate

In December 2022, the FCC opened a call for comment requesting stakeholders provide input on whether E-Rate program funds can be used to support advanced or next-generation firewalls and services, as well as other network security services. For those unfamiliar with the program, E-Rate is a Federal Communications Commission (FCC) program that provides funding to schools and libraries for telecommunications and internet services.

Block attackers in your apps and APIs with Datadog Application Security Management

Securing modern-day production systems is complex and requires a variety of measures—from secure coding practices and security testing to network protection and vulnerability scanning. Scaling these solutions to keep pace with the speed of development teams can be difficult, resulting in sprawling workflows and disparate sets of tooling.

Vulnerability Prioritization - Combating Developer Fatigue

We are in early 2023, and we have over 2700 new vulnerabilities registered in CVE. It is still a challenge for developers to endure the fatigue of continually vulnerability prioritization and mitigating new threats. Our findings in the Sysdig 2023 Cloud-Native Security and Container Usage Report provide signs of hope for overburdened developers, as the data showed opportunities to focus remediation efforts on vulnerable packages loaded at runtime.