Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Next-Gen Container Security: Why Cloud Context Matters

Container security has experienced significant transformation over the past decade. From the emergence of foundational tools like Docker to the maturation of orchestration platforms such as Kubernetes, the container security landscape looks different than it did even a few years ago. With Gartner predicting 95% of organizations will be running containerized applications in production by 2028, it’s clear that container security is going to be a key priority for most organizations moving forward.

How Hardening is Reflected in the Different NIST Standards

NIST hardening standards and best practices refer to a collection of guidelines and recommended methods created by NIST (National Institute of Standards and Technology). These standards are crafted with the intention of strengthening the security and robustness of information systems. They serve as a structured approach for organizations to fortify their systems against possible security vulnerabilities and the risks associated with them.

Hardening Systems for HIPAA 2025: A Hospital IT Guide to Compliance

The U.S. Department of Health and Human Services (HHS), the governmental body responsible for enforcing and overseeing the Health Insurance Portability and Accountability Act (HIPAA) proposed updates in December 2024, which were added to the Federal Register for comments on January 6th. These updates include changes to the Security Rule, looking to enhance cybersecurity to align with evolving security standards.

How effective security awareness training elevates cybersecurity in your organization

Cybersecurity has become a paramount concern for organizations across all sectors in the rapidly evolving digital landscape. As technology leaders, we recognize that while technological defenses are crucial, the human element often represents the most significant vulnerability. Implementing comprehensive security awareness training (SAT) is essential to fortify this human firewall, mitigate risks, and cultivate a security-conscious organizational culture.

GitGuardian - protect your enterprise against leaked secrets and mismanaged identities.

We allow organizations to discover and remediate exposed Secrets as well as manage NHIs lifecycle across both their internal network and public perimeter (for ex over permissioned, stale secrets, secrets in multiple vaults…). Our unrivaled secrets detection engine is trained and backtested in real-time against +5Bn commits and used by more than 600k developers, it is also the n°1 app on the GitHub Market place. GitGuardian integrates natively with the SDLC (GitHub, Gitlab…) but also with other data sources such as Jira, Slack, ServiceNow, Docker, as secrets leak in all these environments.

Adversary Tradecraft: Apache Tomcat RCE

CVE-2025-24813 is a critical vulnerability (CVSS base score of 9.8) affecting Apache Tomcat, a widely used open-source web server and servlet container. This issue affects Apache Tomcat: In this blog, we’ll simulate an attack and look at the activity within Graylog. Throughout the analysis, and at the conclusion of the post, we’ll provide practical threat-hunting and detection strategies you can implement in your own environments.

Ep 5: A Cyber Detente

Every U.S. administration, dating back to President H.W. Bush has struggled to address the threat of Chinese trade theft. But a growing sense of urgency kicks in as American businesses start hemorrhaging trade secrets and entire product lines start vanishing to Chinese copycats. Just as the Obama Administration is set to do something about it, Edward Snowden shifts the narrative back onto the United States.