Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

PCI DSS 4.0 Requirements - Network Security Controls and Secure Configuration

We have officially entered the 12-month countdown to the enactment of the new Payment Card Industry Data Security Standard (PCI DSS). The new version, 4.0, set to go into effect on April 1, 2024, contains some interesting and notable changes. Is your organization ready to meet the new requirements? In this 6-part series, we spoke with specialists who help to break down the changes to make your transition to the new Standard as easy as possible.

Decade-old critical vulnerability in Jetpack patched on millions of WordPress websites

Jetpack, an extremely popular WordPress plugin that provides a variety of functions including security features for around five million websites, has received a critical security update following the discovery of a bug that has lurked unnoticed since 2012. Jetpack's maintainers, Automattic, announced on Tuesday that it had worked closely with the WordPress security team to push out an automatic patch for every version of Jetpack since 2.0.

The Science of Behavioral Biometrics in UEBA Solutions

As the world becomes increasingly digital, cyber-attacks are becoming more sophisticated, and traditional security measures like firewalls and passwords are no longer enough to protect sensitive data. Fortunately, advancements in technology have given rise to User and Entity Behavior Analytics (UEBA), a behavioral biometrics-based approach that can effectively detect and prevent cyber threats. In this blog post, we will explore the role of behavioral biometrics in UEBA.

Maximizing Your Security With UEBA Integration | Logsign

Have you ever wondered how to detect and prevent cyberattacks that can evade traditional security solutions? Have you ever wished for a holistic and coordinated security strategy that covers all aspects of your network? If so, consider user and entity behavior analytics (UEBA) integration. In this blog post, we will explain the benefits of UEBA integration and how to manage and optimize UEBA integration.

A quick primer on LDAP injection

Lightweight Directory Access Protocol (LDAP) is an authentication mechanism for securing web applications. LDAP is popular because it's lightweight and scales easily — features that appeal to developers, but mean that LDAP databases often store large amounts of valuable information. This makes them an attractive target for attackers. Applications construct LDAP queries derived from user inputs to access and manipulate the information stored in LDAP databases.

CrowdStrike Invests in and Partners with Prelude Security to Drive Continuous Security Testing and Validation for Our Customers

Managing security posture at scale is a significant challenge for global organizations of all sizes. With a rapidly expanding security estate and a global worker gap of 3.4 million, according to (ICS)2, it is imperative that the efficacy of defensive controls is maximized to combat sophisticated adversaries. In order to do so effectively, organizations must test their security controls on a continuous basis to uncover configuration gaps and areas of missing visibility.