Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Policy as code in Kubernetes: security with seccomp and network policies

The dynamic world of Kubernetes and cloud security is constantly evolving. As we explore this complicated ecosystem, it’s crucial to understand the role of policy as code (PaC) and its impact on operations and security teams. Emerging from the broader paradigm of infrastructure as code (IaC), PaC represents a significant shift in how we manage and secure cloud-native environments.

Container Security Best Practices

Containers are transforming how enterprises deploy and use applications - their efficiency and cost-effectiveness making them a cornerstone of modern IT strategies. Compared to traditional virtualization, where the server runs a hypervisor, and then virtual machines with entire guest operating systems and software run on top of the hypervisor, containers allow more versatility since they simplify management and provide faster provisioning of applications and resources.

Cybersecurity Compliance for IT: Key Regulatory Frameworks and Standards

Cybersecurity compliance is crucial for protecting sensitive data and ensuring adherence to global security compliance standards. Protegrity’s comprehensive data security solutions, such as tokenization and dynamic data masking, empower organizations to safeguard their sensitive PII while allowing specific data sets to be protected and maintain compliance with regulations like GDPR, HIPAA rules and regulations, and PCI-DSS.

Mastering PowerShell's Move-Item Cmdlet for File Management

As a routine task, users move items, such as files and folders from one place to another on our computer, so that data is sorted and makes sense. While this can be accomplished with simple copy and paste options from within the File Explorer, advanced users may prefer PowerShell for efficiency and precision. The Move-Item cmdlet in PowerShell moves an item from one location to another in the File Explorer, with its properties, contents, and child items intact.

Decoding Agent Tesla: The Spyware Stealing Data Silently!

Agent Tesla is an advanced piece of malware that functions as a keylogger and RAT (remote access trojan). The malware was first identified in 2014. They are crafted to infiltrate systems and seize sensitive information like usernames, passwords, and other private data mainly by logging keystrokes. This kind of spyware works secretly in the background, which is difficult to detect for the users.

How Datadog can support your DORA compliance strategy and operational resilience

Reliable access to financial data is critical for organizations and individual consumers alike, making resiliency key for financial institutions responsible for managing this information. While cloud computing can strengthen your app’s resiliency, it can also open up new security risks and require more complex continuity planning.

Key learnings from the 2024 State of Cloud Security study

We’ve just released the 2024 State of Cloud Security study, where we analyzed the security posture of thousands of organizations using AWS, Azure, and Google Cloud. In particular, we found that: In this post, we provide key recommendations based on these findings, and we explain how you can use Datadog Cloud Security Management (CSM) to improve your security posture.

Top 5 Logistics and Postal Scams of 2024

From groceries to gadgets, everything can be delivered to your doorstep these days with just a few clicks. In this e-commerce world, logistics and postal companies have become critical players in the retail sector, with brand names that everyone recognizes. But this has also made them goldmines of PII that attackers would do anything to get their hands on.

Hooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emails

Previously, Trustwave SpiderLabs covered a massive fake order spam scheme that impersonated a tech support company and propagated via Google Groups. Since then, we have observed more spam campaigns using this hybrid form of cyberattack with varying tactics, techniques, and procedures (TTP). Between July and September, we witnessed a 140% increase in these spam campaigns. In this blog, we will showcase the different spam techniques used in these phishing emails.

Server Compliance Simplified: Compliance for Security

Server compliance is critical to regulatory compliance, ensuring that organizations meet industry-specific standards for protecting sensitive data. Proper server configuration and continuous risk management are essential to avoid fines and maintain operational integrity. Server compliance is the adherence to specific regulations, standards, and best practices designed to safeguard sensitive information, maintain operational efficiency, and mitigate potential risks.