Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Rise of Cyber Mercenaries: Governments' Secret Weapons in Cyber Warfare | Razorthorn Security

In this episode, we tackle some of the most pressing issues in the convergence of cyber warfare, information security and political strategy. Our guests, Iain and Chris, share their frontline insights on how the digital realm has become a playground for clandestine operations, where cyber mercenaries are the new knights, rooks and perhaps even the kings.

Add GitGuardian Secrets Detection To Jira Cloud

If you are using Jira Cloud for issue-tracking and project management, we have some great news! GitGuardian can now help you find and remediate any plaintext secrets found inside your Jira Cloud instance, You can now rely on GitGuardian's real-time secrets detection to find credentials - shared in Jira ticket descriptions, comments, or even titles. Integrating Jira Cloud with GitGuardian is simple, but does requires a Business or Enterprise plan.

K8s Backup Automation: Tools & Best Practices

Kubernetes (K8s) is a key platform for deploying and managing containerized applications. As more and more businesses use Kubernetes, it’s clear that there’s a need for robust data protection strategies. A crucial element of these strategies is the automation of procedures to backup K8s to prevent data loss, which could otherwise result in significant operational disruptions and financial consequences.

Initial Access Brokers Explained

Initial access brokers (IABs) form a key part of the cybercriminal ecosystem. They facilitate access for ransomware groups, data leakers, and advanced persistent threat groups (APTs) into corporate networks. They are highly specialised, and professional, and operate in an established, lucrative market often characterised by rigid rules and conventions. Every ransomware attack or data breach begins with initial access, following the reconnaissance phase of an attack.

What is an SSL Certificate?

An SSL certificate enables an encrypted rather than a plain-text connection and verifies websites are secure. It stands for Secure Sockets Layer and creates an encrypted link between the server on which a site is hosted and the visitors' browsers. SSL certificates allow websites to use HTTPS, the more secure version of HTTP. The website's origin server hosts the SSL certificate, which is a data file. SSL certificates enable SSL/TLS encryption and contain the website's public key.