Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

How Will the NIST CSF Framework 2.0 Impact Everyone?

The National Institute of Standards and Technology (NIST) has released version 2.0 of its Cyber security Framework (CSF), significantly elevating cyber security guidelines. This update brings in major changes that will affect several actors like Chief Information Security Officers (CISOs), Managed Security Service Providers (MSSPs), and individual users, among others.

Understanding command injection vulnerabilities in Go

Go developers might need to use system commands for various scenarios, such as image manipulation, where they need to process or resize images or execute system commands to manage resources or gather metrics or logs. At other times, perhaps you are building a new system in Go that needs to interface with existing legacy systems. This interface leans on executing system commands and processing their output.

Azure DevOps Security Best Practices

Data-handling platforms such as Azure DevOps are often relied on by many different modern organizations, therefore it is important to secure such environments. These widely used platforms simplify DevOps processes like project management and the work of developers. However, there is a downside, the rise of technology brings an increased risk of cyber attacks.

Breaking Down Jit's New Approach to ASPM

Application Security Posture Management (ASPM) emerged to address gaps in traditional application and cloud security scanners – like SAST, SCA, secrets detection, IaC scanning, CSPM, and many others – that generate noisy alerts and silo security insights across various tools. By providing a consolidated view of product security risks that are prioritized according to their business and runtime context, ASPM helps security teams understand which issues truly matter.

What is multi-step reasoning?

Multi-step reasoning is a concept that is taught in grade school math class, but it applies far beyond mathematical calculations and word problems. It is the process of solving a problem requiring multiple individual calculations or steps in order to reach the final answer. Multi-step reasoning requires sequencing, logic, and sometimes prior knowledge or inference.

This is How the Disney Insider Threat Incident Reframes IAM Security

It’s not that often that a story about a Joiner-Mover-Leaver (JML) failure makes the international news. But throw in an insider threat actor making potentially life threatening changes to the impacted systems and it becomes quite the doozy. Especially when the company at the center of the story is Disney.

Fireblocks x Uniswap Labs: Bringing Unichain to the Fireblocks Network

Today, we’re excited to announce that Fireblocks has expanded our blockchain support with the addition of Unichain – a Superchain L2 built by Uniswap Labs that’s designed to be the home for DeFi and liquidity across chains. At Fireblocks, we are committed to continually delivering the fastest blockchain support and building secure solutions to access and trade across DeFi platforms.

How Database Access Controls Evolved to Meet Modern Security Needs

Teleport's Database Access Controls (DAC) have always been designed to offer secure, auditable access to databases. But in today's rapidly evolving security landscape, simply having access controls isn't enough. Organizations need more granular control, better visibility, and seamless integration with existing security policies. This post explores how Teleport's latest features—object-level permissions and Teleport Policy integration—address these needs.

API, Identities and solving for the biggest challenges

API calls are the backbone of modern software, enabling applications to communicate and share data seamlessly. However, with this integration comes the challenge of understanding and managing the identities used in API calls. These identities, often tied to authentication and authorization mechanisms, are crucial for determining what data is accessed and exchanged.