Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

The NIST cybersecurity framework (CSF) and what it can do for you

The NIST Cybersecurity Framework (CSF) has only been around for four years and while developed for critical infrastructure, resulting from Executive Order 13636, it has been widely adopted across both private and public sectors and organizational sizes. It is used inside of the US government, with 20 states using it (at last count).

Detectify opens US office in Boston to accelerate growth

Stockholm, Sweden & Boston, MA – Detectify, a Swedish domain and web application security company, is launching its US operations in Boston, Massachussets. The company achieved 3x revenue growth in 2018 and the launch of the Boston office will further accelerate growth in the US market.

Detecting the Kubernetes API Server DoS Vulnerability (CVE-2019-1002100)

Recently, a new Kubernetes related vulnerability was announced that affected the kube-apiserver. This was a denial of service vulnerability where authorized users with write permissions could overload the API server as it is handling requests. The issue is categorized as a medium severity (CVSS score of 6.5) and can be resolved by upgrading the kube-apiserver to v1.11.8, v1.12.6, or v1.13.4.

How Can You Protect Your Company From Hackers?

According to a Clark School Study at the University of Maryland, there is a cyber-attack every 39 seconds on average. If you are running a small business, you have more reason for concern as further studies reveal that 43 percent of hacker attacks target small businesses. With such alarming cybersecurity stats, it is vital for you to learn how you can protect your company from bad-actors.

EDR: The richest data in your SOC

Endpoint detection and response solutions – EDR as it’s more commonly known – act as enterprise surveillance and thus deliver a rich dataset to security professionals. But as with all advances in security, this rich data wasn’t always available in a speedy and cost-effective way. Yet, as a security professional in today’s always-on world, one of your key responsibilities is to efficiently leverage incoming data from every endpoint across your organization.

What is artificial intelligence?

Artificial intelligence (AI) is used all around us and if you’ve used some sort of voice activated technology to make your life easier, then there was likely some element of AI involved. Some of the most notable examples include Siri, Amazon Alexa, Google Assistant and Tesla semi-autonomous vehicles. Individual consumers no longer have to fumble around in the dark to flip the light switch at home, manually search playlists for songs, or type in a password to get into smartphones.