Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The State of Secrets Detection in SaaS Apps

Welcome to our first ever The State of Secrets Security in SaaS Apps, an in-depth look at what security risks are posed by the data stored in organizations' SaaS applications. As companies have adopted a remote-first approach to work, these solutions have increasingly been used to send and store passwords, secrets, and API keys.

Fireblocks BUIDLathon offers $25k bounty at ETHDenver '23

Fireblocks will host the first-ever Fireblocks BUIDLathon at this year’s ETHDenver, the largest and longest-running ETH-focused event in the world. With $25,000 in prizes up for grabs, the Fireblocks BUIDLathon is an exciting chance to gain early access to a Fireblocks Developer Sandbox to build new Web3 products. Read on to learn everything you need to know about the competition.

Top 8 Reasons Why Stricter ID Verification Is Helpful for Business

A strict ID verification system is important for your business. Strong security, top-notch customer service, and having a reputation as a reliable company help your business grow. We have some tips for you about why business online ID verification is essential.

Cyber Security: Understanding the 5 Phases of Intrusion

Here at Graylog, we have recently had an increase in conversations with security teams from leading companies. We want to share our key findings with the Graylog community. The good thing is that cybercriminals use a methodical approach when planning an attack. By understanding their process and knowing your network, you will be better prepared and able to stay one step ahead.

How to Tell If a Website is Legit

The internet is used for just about everything in our lives: to pay bills, shop, stream movies, attend school, work remotely and more. Since we are now online more than ever, cybercriminals are always coming up with new ways to steal data. One way is by leading people to illegitimate websites, which is why it’s crucial that you know how to spot a legitimate site from a phony one.

7 reasons why Endpoint Security and Response shouldn't be ignored

When strategizing a security approach for the coming year, many solutions will cross a CISO’s desk, all useful in covering some part of the network. Organizations must scrutinize every layer and each solution to make sure their security stack runs efficiently while still boasting a Defense-in-Depth approach. There cannot be an overload of alerts, the learning curve must be worth the cost, and all solutions must integrate with each other.

A Study on the Security Measures Used by Top Operating Systems

An Operating System (OS) is the software that acts as a bridge between the computer hardware and the applications being run on the computer. It is responsible for managing and controlling the computer’s resources such as memory, processors, and input/output devices. The OS provides a user-friendly interface for users to interact with the computer, making it easier for users to perform tasks like file management, launching applications, and configuring system settings.

Cybersecurity Threats in Europe: What You Need to Know and What to Do About Them

As governments and organizations standardize and harmonize their responses to better mitigate the increasing number of cyber-attacks, so do cybercriminals. In Europe, security decision-makers and businesses face similar attack techniques as their global counterparts. While the methodologies employed are identical because they all rely on the same digital technologies exploiting similar vulnerabilities, the motivations vary.

Phishing attacks: The phisherman, the phish, the bait and the hook

There’s a good chance that you have heard the word phishing or probably even been a victim in the past, however you do not understand what it really means and how to protect yourself from being a victim. According to CNBC, there were 225 million phishing attacks in 2022 which depicts a 61% increase from the number of reported cases in 2021.