Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cryptography Made Simple: What You Need To Know and Why It's So Awesome

When you browse the web, use social media, or shop online, you probably don’t think about how your personal information is being safeguarded. However, with so many cyberattacks hitting the news on a frequent basis, this is something that should concern you. You see, hackers can gain access to your personal information if it isn’t properly encrypted and safeguarded. Thankfully, cryptography is here to save the day.

Learnings from the Optus Breach

Before we delve into the reasons behind Optus breach, let’s see the chronology of events. According to various reports, Optus customer data was accessed via an API interface that was not secure. Apart from unauthenticated API, there was another serious issue related to easily enumerated ID’s (identifiers). These are foundational controls that were found lacking in the API implementation..

How to Build a DeFi App: A Modern and Reliable guide for 2022-2023

More and more companies are eager to enter the field of decentralized finance as the financial industry transitions to the digital era (DeFi). However, what is DeFi app development, and how do you begin? You will learn everything you need to know about how to build a DeFi app in 2022-2023 from this guide!
Sponsored Post

Monitoring Transaction Log Files for PCI compliance

File Integrity Monitoring, aka as FIM, is a must-have feature for anyone in charge of security. With FIM, one can detect when a critical file, such as a file that belongs to the Operating System, or a key configuration file, is changed. In most cases, configuring FIM is straightforward: If the file changes then generate an alert.

Image scanning for GitLab CI/CD

Scanning a container image for vulnerabilities or misconfigurations on your GitLab CI/CD using Sysdig Secure is a straightforward process. This article demonstrates a step-by-step example of how to do it. The following proof of content showcased how to leverage the sysdig-cli-scanner with GitLab CI/CD. Although possible, this procedure is not officially supported by Sysdig, so we recommend checking the documentation to adapt these steps to your environment.

CrowdStrike Enables Federal Departments and Agencies to Meet CISA Operational Directive 23-01

In support of the Executive Order on Improving the Nation’s Cybersecurity, the Cybersecurity and Infrastructure Security Agency (CISA) recently published a Binding Operational Directive (BOD) 23-01, designed to improve cybersecurity for the Federal Civilian Executive Branch (FCEB) enterprise and their respective unclassified assets.

12 Essential ways to improve your website security

In today's digital age, a business website is essential for success. Not only does it provide potential customers with information about your products or services, but it also allows you to connect and engage with them directly. However, simply having a website is not enough. To ensure that your site is effective and safe, you need to make sure that it has all the necessary security features. In this article, we will discuss twelve security features that every business website must have.

7 Key Measures of an Insider Threat Program for the Manufacturing Industry

The increasing digitalization and interconnectivity of the manufacturing industry has fundamentally changed how this sector operates. With automation, remote diagnostics, and connections to the internet, manufacturers have faced a growing number of cybersecurity challenges, including insider risks.

Leveraging Microsoft Teams webhooks to create a Tines chatbot

Microsoft requires users to leverage the Microsoft Developer Portal to create new Teams applications, such as chatbots. At Tines, we thought it might be helpful to provide instructions for alternative options if you don't want to create a chatbot in the portal. For those who would prefer to send messages directly to a Teams channel instead of configuring a chatbot, Microsoft Teams can receive messages in a channel via a webhook.