Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding FedRAMP System Boundaries

In the ever-changing world of technology, staying secure is a top priority for many organizations. Identifying and documenting system boundaries is essential for keeping data safe and secure, but what does this mean? In this article, we’ll explore system boundaries, how to identify them, and how to generate system boundary diagrams. By the end of this guide, you’ll be well-versed in understanding system boundaries and creating diagrams that can help keep your information secure!

The Unseen Risks of Open Source Dependencies: The Case of an Abandoned Name

One often-overlooked risk in the bustling ecosystem of open-source software are vulnerabilities introduced through software dependencies. We mention this because today, a malicious actor took over a RubyGems package name with more than two million downloads. Mend.io technology detected the package before it could be used for an attack, but the case of ‘gemnasium-gitlab-service‘ serves as an important reminder of the risk of neglecting dependency management.

Reverse-Engineering Java and JavaScript Malware

Most malware security researchers encounter in the wild is written in C or C++. These languages provide low-level system access and control, plus performance, allowing threat actors to create highly efficient and stealthy code. But that doesn’t mean cybercriminals are limited to those two languages. SecurityScorecard recently reverse-engineered the Vjw0rm worm written in JavaScript and the Java-based STRRAT remote access trojan (RAT).

Expanding Enterprise Attack Surfaces (EAS) and the increasing importance of Identity & Access Management

In the past five years, Enterprise Attack Surfaces (EAS) have evolved significantly. EAS refer to the various entry points that cybercriminals can exploit to gain unauthorized access to an organization's digital assets. With the increasing use of cloud-based services, the proliferation of connected devices and the growing reliance on third-party vendors, attack surfaces have become broader, more numerous and more complex.

Teleport 13: Automatic agent updates, Simplified AWS setup, Light theme, and more.

Once again, it’s time for everyone’s favorite announcement: a brand new Teleport release! This release marks version 13 of Teleport and is packed with features, including a UI makeover, performance improvements, a few exciting previews, and so much more. Let’s dive in! Watch this episode recording with Ben Arent, Teleport’s Director of Developer Relations, as he discusses what’s new in Teleport 13.

Empowering Cybersecurity: The Power of Automation

Discover how AlgoSec revolutionizes cybersecurity through advanced automation. Learn how AlgoSec's cutting-edge technology streamlines security processes, optimizes policy management, and enhances threat detection and response. Unlock the full power of automation with AlgoSec to fortify your cybersecurity posture and proactively combat evolving threats. Stay one step ahead in the ever-changing landscape of cybersecurity.

Centripetal Expands Innovative CleanINTERNET® Technology to the Cloud

Centripetal announces the launch of CleanINTERNET® CLOUD extending protection to enterprise assets anywhere - whether on premises, remote or in the cloud. CleanINTERNET® is a revolutionary approach to defending organizations from cyber threats.

Amazon Security Lake & ChaosSearch deliver security analytics with industry-leading cost & unlimited retention

Amazon Security Lake is a new service from Amazon Web Services (AWS) that is designed to help organizations improve their security posture by automating the collection, normalization, and consolidation of security-related log and event data from integrated AWS services and third-party services (Source Partners). By centralizing all the security data in a single location, organizations can gain greater visibility and identify potential threats more quickly.