Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

TruffleHog vs. Gitleaks: A Detailed Comparison of Secret Scanning Tools

TruffleHog and Gitleaks are popular secrets scanning tools that can automatically surface hardcoded secrets such as API keys, passwords, and tokens. They can both be integrated into the Software Development Lifecycle (SDLC) to proactively scan repositories to identify and rectify potential issues before they can be exploited. The need for effective secret detection tools underscores a broader shift toward more secure software development practices.

Lessons Learned About Secrets Protection After the Sisense Breach

Sisense is a popular monitoring tool that enables users to monitor business metrics from multiple third-party sources in a single dashboard. On April 10, the company informed customers that the sensitive information they entrusted with Sisense may have been compromised and urged them to reset their password and rotate their secrets. According to KrebsOnSecurity, the attackers were allegedly able to access GitLab repositories hosted by Sisense, where hard-coded secrets may have been found.

Learning from cloud transformation as we move to AI

Development teams of all sizes are embracing the excitement and possibility of using AI tools to build software. Coding assistants like Google Gemini and Github Copilot have the potential to accelerate development like never before, and developers are adopting these tools — whether or not leadership has officially approved them. As your team considers the best ways to adopt this new technology, this transition might feel like déjà vu.

What is Identity Theft Insurance? Is it Worth It?

When a data breach happens, criminals may instantly expose millions of personal, financial, and medical information. They can then use that compromised data to break into other systems, help commit consumer frauds schemes, or be sold to the highest bidder. If that compromised information also contains personally identifiable information (PII), those exposed may fall victim to identity theft.

User Account Control Settings Hardening Guide (2024)

User Account Control (UAC) serves as a security feature in Windows, aiming to safeguard the operating system from unauthorized modifications. Whenever alterations demand administrator-level permissions, UAC prompts the user, allowing them to either authorize or reject the requested change. User Account Control (UAC) provides several benefits, especially in maintaining security and minimizing risks associated with administrative privilege.

Automate Non-Human Identity Security and Management with Torq and Astrix

Organizations’ zero-trust policies and identity-centric programs ensure that user identities and login credentials are vigorously protected with IAM policies and security tools like MFA or IP restrictions. However, the situation is very different regarding non-human identities (NHI) like API keys, OAuth apps, service accounts, and secrets. Lack of visibility, monitoring, and governance of this permissive access is everywhere, and attackers have figured it out.

Four Operational Security Pillars for Building Blockchain Apps

For hackers in 2024, digital assets likely look like a gold mine. Looking back at 2023, many people in the industry celebrated that there were only $1.5 billion of funds stolen due to hacks and security breaches over the course of the year (a smaller number when contrasted with 2022’s jaw-dropping $3.8 billion).

Keeper Secures Repeat Win in CHIP Password Manager Test

Keeper Security has once again clinched the prestigious title of “Test Winner” in a group test of leading password managers conducted by CHIP Magazine, a renowned consumer technology publication in Germany. This marks the second consecutive year Keeper has secured this esteemed recognition, following its victory in the 2023 review.