Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Constitutes a Data Breach?

A data breach occurs when sensitive data is copied, transmitted, viewed, stolen, or accessed by an unauthorized individual. For a security incident to constitute a data breach, the exposure of sensitive data must be intentional. The presence of intent differentiates a data breach from a data leak, where exposure is accidental. A data leak occurs when data is accidentally exposed through a vulnerability, such as weak passwords.

Denial of Service Vulnerability in Envoy Proxy - CVE-2022-29225

The JFrog Security Research team is constantly looking for new and previously unknown software vulnerabilities in popular open-source projects to help improve their security posture. As part of this effort, we recently discovered a denial of service (DoS) vulnerability in Envoy Proxy, a widely used open-source edge and service proxy server, designed for cloud-native applications and high traffic websites.

Hello CISO - Episode 5: Enterprise Two-Factor Authentication

Is Multi-Factor Authentication (MFA) always a good idea? What type of threat does it protect against? Can IT leverage MFA to tighten security without negatively affecting productivity? In this episode of Hello CISO, Troy is talking MFA in the enterprise: what it is and, perhaps more importantly, what it isn't.

3 Tips for Mitigating the Insider Threat Facing Government Organizations

Verizon’s Data Breach Investigation Report for 2022 (DBIR) was recently released and it has some good news and it has some bad news when it comes to the risk of insider attacks. First the good news, sort of. According to the DBIR, the vast majority of breaches continue to come from external actors (80% vs 18% of insiders). Hopefully we can be a little less suspicious of Bob who sits two offices down from you. However when an insider attack happens, it can be really, really destructive.

Automate Data Mapping for GDPR and Other Data Privacy Laws

Whether you’re a compliance expert or a novice, adhering to data privacy laws confuses even the best of companies. One of the key points of confusion is the fact that you can’t possibly comply with current and future laws without knowing what data you collect, where it goes, and how it’s used and retained. It sounds simple, but it is not. In fact, it’s a challenge that applies to nearly every organization today.