Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Application Security report: 2024 update

Over the last twelve months, the Internet security landscape has changed dramatically. Geopolitical uncertainty, coupled with an active 2024 voting season in many countries across the world, has led to a substantial increase in malicious traffic activity across the Internet. In this report, we take a look at Cloudflare’s perspective on Internet application security. This report is the fourth edition of our Application Security Report and is an official update to our Q2 2023 report.

Effectively Prevent Unmanaged Mobile Devices From Accessing Your Organizational Services

Mobile devices have become so integral to both business and personal lives that it is difficult to imagine a life without them. There’s more attack surface area as a result, and it’s IT’s job to mitigate the risk of cyberattacks. Insider threats are often involved, because employees and their devices can be one of the weakest links in the security chain.

Polyfill Supply Chain Attack Hits 100K Websites

Over 100,000 websites fell victim to a recent web supply chain attack through the Polyfill JavaScript library. This incident underscores significant vulnerabilities in third-party script integration across the web. This article covers what Polyfill does, why it’s now a threat, and the steps you should take if your website relies on it.

Managing Open Source Costs: The CISOs Guide to Efficient and Effective Security Operations

Open source software offers numerous benefits, including flexibility and cost savings, but managing, maintaining, and scaling these tools can become a significant burden for CISOs. As open source solutions proliferate within your organization, the associated costs and complexities can spiral out of control. This webinar will address the challenge of managing open source costs and how LimaCharlie can provide the efficiencies needed to keep these expenses in check.

Hardening Infrastructure Security Against SSO Identity Provider Compromise

In an era where Identity Providers (IdPs) have become prime targets for cyber attackers, relying solely on single sign-on (SSO) authentication can leave organizations vulnerable to various sophisticated threats such as social engineering, credential stuffing, and session hijacking. Join us for an in-depth webinar to explore how Teleport is redefining infrastructure security strategies that protect infrastructure even in the event of identity provider compromise.

Keeper 101 | Enterprise: How to Use Keeper Commander CLI

Keeper Commander allows you to perform administrative and vault functions from a command line environment on Mac, Windows and Linux. You can start Commander by typing “keeper shell” in a terminal window. Enter your username, password, and complete any 2FA requirements when prompted. If you are logging in for the first time on a new device, you may be prompted for device approval for additional security. More information about login methods, such as SSO, can be found in our documentation.