Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Risks and Mitigation of Insider Threats

Insider attacks are growing, whereby 60% of organizations in the past year alone have suffered employee-related data breaches. Surprised? Most businesses get blindsided by the people they put their most trust in. It can be accidental data leaks or malicious actions, but the risk is very real and, regrettably, on the rise. It’s no longer a matter of “if,” but rather “when” an insider threat could compromise your organization’s most sensitive data.

Shift left with the Sysdig extension for Visual Studio Code

Adversaries exploit security blind spots and sneak through traditional defenses to craft attacks that impact your operations, or even worse, your reputation. One recent example is the Revival Hijack supply-chain attack, where threat actors registered new PyPi projects with names of previously deleted packages. One way to counter this imminent threat is to “shift left,” or take ownership of the code’s security posture earlier in the development process.

Complete your Kubernetes security with runtime protection

Kubernetes today is the de facto standard for container orchestration, deployment automation, scaling, and management of containerized apps. The robustness and scalability of this open-source platform make it a valuable tool for businesses leveraging cloud-native technologies and DevOps practices. However, as with any technology that handles sensitive data and crucial operations, the importance of security in Kubernetes environments can’t be overstated.

Fireblocks x Lido Institutional: Bringing Liquid Staking to the Fireblocks Network

In response to growing institutional demand, Fireblocks has launched an integration with Lido to provide easy and secure in-platform access to Lido’s liquid staking protocol and stETH token. Users can now stake their ETH, receive rewards, and use stETH for on-chain activities, including Fireblocks Off Exchange, which allows Fireblocks users to lock their stETH in a self-custodial collateral wallet to trade on exchanges like Deribit and Bybit.

Effortlessly Migrate Your AKS Clusters to Azure Container Storage Using CloudCasa

Azure Container Storage is a cloud-based volume management, deployment, and orchestration service built natively for containers. It integrates with Kubernetes, allowing you to dynamically and automatically provision persistent volumes to store data for stateful applications running on Kubernetes clusters.

What Is PGP Encryption and How Does It Work?

You’re working late Thursday evening as a contractor for a powerful government agency. You stumble across classified documents uncovering a surveillance program that invades the privacy of millions of citizens. Your heart races as you decide to expose this to the masses and enlist the help of a few journalists. But you also know the organization you work for monitors emails (and other forms of communication). If your emails hit the wrong eyes, you could face severe penalties.

Defensive Playbook: Understanding New Trends in External Risk with CyCognito's State of External Exposure Management Report

We just published our 2024 State of External Exposure Management Report. In this report, we looked at where serious issues hide on the average attack surface, how basic protections can help (or fail to) protect critical assets, and the ways that deprioritizing issues can help security teams spend their time on the right vulnerabilities.

Static Code Analysis for Python: 7 features to look out for

Python dominates the coding world, powering everything from web apps to AI breakthroughs. It’s so popular that 70% of developers have Python in their toolkit. It’s no wonder it consistently ranks among the top languages year after year. But with great power comes great responsibility…to write bug-free code. That’s where the secret weapon of top Python pros comes in: Static Code Analysis (SCA).

Introducing Ephemeral IDs: a new tool for fraud detection

In the early days of the Internet, a single IP address was a reliable indicator of a single user. However, today’s Internet is more complex. Shared IP addresses are now common, with users connecting via mobile IP address pools, VPNs, or behind CGNAT (Carrier Grade Network Address Translation). This makes relying on IP addresses alone a weak method to combat modern threats like automated attacks and fraudulent activity.

The Cloud Security Confidence Gap: What Leaders Need to Know

In this increasingly cloud-first world, data protection is more important than ever. With so many organizations relying on cloud applications to get work done, keeping sensitive information secure is a top priority. But balancing convenient access with strong security measures is no easy feat. In fact, only a small fraction of security leaders feel truly confident in their current data security measures. Lookout recently surveyed 100 executives to get their take on data security in the cloud.