Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is the difference between a root process and a containerized root process?

To answer this question, let’s first look at some history. Processes are software instances running in their own memory spaces. They enable a user to execute multiple software instances in parallel on the same computer. The concepts are derived from operating systems of the 1960s, with UNIX first being released in 1971. In today’s operating systems, every process is associated with an identity to which authorizations are bound. This enables the definition of access controls around processes.

Data Destruction: The Final Line of Defense Against Cyber Attacks

Data is the lifeblood of modern organizations, and while watertight data protection policies are undeniably crucial, the need for robust data destruction methods has never been more pressing. Ultimately, all parties and vendors in your supply chain trust you to maintain the integrity of their data. Once that data is no longer needed, transparency about its whereabouts is vital.

EU Is Tightening Cybersecurity for Energy Providers

The energy sector is having a tumultuous decade. During the COVID pandemic, the price of oil plummeted. In 2021, a ransomware attack forced one of the US’s most significant oil pipelines to cease operations for five days, causing a state of emergency in seventeen states. Putin’s war in Ukraine has disrupted natural gas supplies across Europe. And now, it seems, it is the electricity providers’ turn to suffer a blow.

What Is SEO Poisoning? 5 Signs You Could Be Impacted

Search engines are the Internet’s gateway, reliably guiding us to the information we seek. However, cybercriminals are increasingly exploiting this trust by using sophisticated techniques to manipulate search engine results to drive traffic to malicious websites by getting them ranked higher than real sites. This practice, known as SEO poisoning, poses a significant threat to individuals and businesses. In a notable example, a 2022 campaign saw 15,000 sites hacked in a Google SEO poisoning attack.

How to track down your expired domain names before hackers do

What happens when your organization’s domain name expires or changes? Expired domains don’t simply disappear, and they can even become attack routes into your organization. Recent news out of Belgium has highlighted the potential danger, with hundreds of expired domain names and email addresses of government services being found available for purchase online.

Key learnings from the State of DevSecOps study

We recently released the State of DevSecOps study, in which we analyzed tens of thousands of applications and cloud environments to assess adoption of best practices that are at the core of DevSecOps today. In particular, we found that: In this post, we provide key recommendations based on these findings, and we explain how you can leverage Datadog Application Security Management (ASM) and Cloud Security Management (CSM) to improve your security posture.

Data Backup Best Practices and Strategies for MSPs

Managing data effectively has never been more of an imperative for Managed Service Providers (MSPs). The one-two punch of increasing cybersecurity threats and regulatory pressures make this particularly pertinent, and with the proliferation of hybrid and remote work models, the importance of reliable data backup solutions is expanding exponentially. With all that taken into account, here are some effective strategies that will deliver continuity and resilience, while in turn maintaining client trust.

JumpCloud and Google: Even Better Together

It’s been just over a year since JumpCloud and Google announced a strategic partnership to seamlessly manage your Google Workspace identities, the access they need, from any device leveraging one platform. You may be wondering what’s new, how it’s going for our customers and partners, and what benefits they’re getting from the joint solution? This article provides a condensed set of resources that make it simpler to get started with a demo or simulations.

How Are SMEs Approaching AI?

Have you heard about AI yet? Just kidding. We know you have. Recently, AI’s popularity has skyrocketed among businesses and consumers alike. This surge was driven by a combination of technological advancements (e.g., machine learning, natural language processing, and data analytics) with an increase in tool accessibility and user-friendliness.

10 modern Node.js runtime features to start using in 2024

The server-side JavaScript runtime scene has been packed with innovations, such as Bun making strides with compatible Node.js APIs and the Node.js runtime featuring a rich standard library and runtime capabilities. As we enter into 2024, this article is a good opportunity to stay abreast of the latest features and functionalities offered by the Node.js runtime.