Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CrowdStrike Outage: What Happened and How to Limit Future Risk

In the early morning of July 19, a software update to CrowdStrike’s Falcon sensor started to cause one of the most extensive IT outages in history, affecting several industry sectors, including financial services, healthcare, transportation, and others. According to CrowdStrike, the outage stemmed from “a defect found in a Falcon content update for Windows hosts.” At this point, the software update has not affected Mac and Linux systems.

Data Catalogs: What They Are & Why They're Important

A data catalog is a critical data repository that enables visibility into what data you have, where it’s going, and who owns it – all critical inputs for maintaining data security. A company's data needs to be both organized and centralized, while also easily being discoverable. In this article, we’ll explore what data catalogs are and how they can create business value in your organization.

Vendor Risk Management Principles: A Strategic Guide For Security Managers

In today’s interconnected business environment, organizations rely heavily on third parties, and while third party relations are critical for success in most businesses, they also leave data more vulnerable to exposure from bad actors. This makes vendor risk management (VRM) a critical component of any company's overall risk management strategies. Effective VRM practices help protect sensitive data and maintain robust security postures, minimizing the potential risks introduced by vendors.

Monitor the security of your Snowflake instance with Datadog Cloud SIEM

Snowflake is a fully managed data platform that enables users to store, process, and analyze large volumes of data across their cloud environments. Recently, Datadog’s Security Research Team posted a threat hunting guide to help defenders ensure the security of their Snowflake instances.

How Salt Catches Low and Slow Attacks While Others Can't

In the ever-evolving landscape of cybersecurity, API attacks pose significant threats to organizations. These attacks, particularly the low and slow variety, are notoriously challenging to detect and mitigate. Salt Security stands out as the premier solution for identifying and addressing these sophisticated threats, setting a benchmark that competitors struggle to match. Here’s why Salt Security is unparalleled in catching low and slow API attacks.

Log on as a Batch Job Rights & Security Setting

Log on as a batch job policy determines the accounts permitted to sign in through a batch-queue tool like the Task Scheduler service. When you schedule a task using the Add Scheduled Task Wizard, assigning it to run under specific credentials, that user is granted the right to log on as a batch job. At the designated time, the Task Scheduler service logs in the user as a batch job rather than an interactive user, executing the task within the user’s security parameters.

Securing Your Cloud: The Critical Role of Firewalls

With any IT environment, especially the public cloud, security is a top concern and priority. When leveraging the public cloud, one of the most important steps to ensuring a protected environment is recognizing the shared responsibility model, as it delineates the security obligations between the cloud provider and your organization.

What to Look for in the Best QR Code Maker

QR codes have become an indispensable tool for businesses and individuals alike. They offer a quick and efficient way to share information, promote products, and engage with customers. However, to get the most out of QR codes, it's crucial to use the right QR code maker. In this article, we will guide you on what to look for in the best QR code maker, ensuring you can leverage this technology effectively.