Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

LimaCharlie: Security Infrastructure as a Service

Full featured free tier of two agents. LimaCharlie provides cybersecurity tools and infrastructure on-demand in a way that scales. We call this approach Security Infrastructure as a Service. It is a DevOps or engineering-centric approach to cybersecurity. A way of getting things done that would feel familiar to anybody that has worked with Amazon Web Services or any other major cloud provider. There are no contracts and no minimums. Easily get what you want and only pay for what you use.

[PAM Masterclass] Episode 3: Mastering remote password management

In this latest episode of the PAM masterclass, we'll explore the remote password management capabilities of ManageEngine's PAM suite. We will also learn to generate strong and unique passwords that comply with built-in and custom policies, and automatically reset passwords of your remote resources. Key takeaways.

Flow Use Case: Automate Continuous Firewall Traffic Monitoring

This Flow allows you to monitor all the traffic from your firewall by correlating it against a table that contains malicious IP addresses. If there is a match, Flow will generate an enriched event that will be logged in a designated my.app table. From this new table, you can take further action by creating detection rules to identify threats that put your organization at risk. Table of Contents.

We are Mend - Company celebration of rebranding from WhiteSource Software to Mend

Mend company celebration of the launch of its rebrand, from WhiteSource Software to Mend. Mend effortlessly secures what developers create. We remove the burden of application security, allowing teams to meet the need to create and deliver quality, secure code faster.

Cybersecurity Insights - MFA Requirements for Salesforce

Salesforce started enforcing the use of multi-factor authentication since February 1st 2022, and they will be auto-enabling it as well. Companies using Salesforce should make sure they implement MFA with the right methods in order to comply with contractual obligations, but also to protect against attacks using stolen credentials.

Stranger Danger: Your JavaScript Attack Surface Just Got Bigger

Building JavaScript applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome, you're a cloud native application developer! As developers, our responsibility broadened, and more software means more software security concerns for us to address.