Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What are Code Signing Certificates and Provisioning Profiles?

A Code Signing certificate is a form of online certificate presented to an organization that is entirely dedicated to software development to validate authenticity and integrity of the programs they create. This type of digital certificate holds significant information and is issued by a CA. Here, a public key is used to bind the organization’s identity. A software developer leverages the power of a Code Signing certificate to sign the executables and applications prior to their release.

Why You Should Scan Your Applications in the Repository

If your application development environment is like most, you’re using more code and you’ve accelerated the development of applications and software. That’s great for productivity, but it presents a big challenge for security, as your developers come under increasing pressure to ship code quickly — while also ensuring that their code is secure. They need to find a sweet spot between speed and security, and scanning at the repository level is the way to go. Here’s why.

LastPass Import Using Single Sign On (SSO) or Federated Login

Migrating your users from LastPass to Keeper is simple and secure. All information stored in LastPass, including passwords, folders, subfolders, custom fields and notes can be moved to Keeper with just a few clicks. Lastpass users who are using Single Sign-On (SSO) or a Federated Authentication Platform such as Okta, Azure and Google, can import credentials, secrets and other data directly into Keeper using our Desktop Application. Our automated import tool now supports both Master Password and federated SSO login methods.

CrowdStrike Brings Extended Detection and Response to New z16 and LinuxONE 4 Single Frame and Rack Mount Models

We are excited to collaborate with IBM, which today unveils its new IBM z16 and LinuxONE Rockhopper 4 single frame and rack mount models, available globally on May 17, 2023. Powered by IBM’s Telum processor, these new configurations are designed for highly efficient data centers with sustainability in mind. CrowdStrike customers can make more effective use of their data center space while remaining resilient in the midst of ongoing global uncertainty.

IAM Legend: How Torq is Reinventing Identity and Access Management

Torq IAM is a critical foundation of modern enterprise IT infrastructures and governance. It’s one of the ways security professionals deliver value to their entire company, customer, and partner ecosystem. It’s also what drives the effective management of organizational roles, assets, and the connections between them. The product team at Torq is focused on changing the IAM game and leveling up our customers’ capabilities.

Building Efficient SecOps Pipelines with AWS Security Lake and Torq

Amazon Security Lake automatically centralizes an organization’s security data from cloud, on-premises, and custom sources it into a purpose-built data lake stored in a customer’s AWS account. Amazon Security Lake reduces the complexity and costs for customers to make their security solutions data accessible to address a variety of security use cases such as threat detection, investigation, and incident response.

Italy Bans ChatGPT: A Portent of the Future, Balancing the Pros and Cons

In a groundbreaking move, Italy has imposed a ban on the widely popular AI tool ChatGPT. This decision comes in the wake of concerns over possible misinformation, biases and the ethical challenges AI-powered technology presents. The ban has sparked a global conversation, with many speculating whether other countries will follow suit.

Scareware From a Phony Ransomware Group

BleepingComputer reports that a cybercriminal gang is sending phony ransomware threats to prior victims of ransomware attacks. The gang, which calls itself “Midnight,” claims to have stolen hundreds of gigabytes of data and threatens to leak it if the victim doesn’t pay a ransom. Security firm Kroll said the gang’s ransom notes use the names of more prolific ransomware actors.