Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A DevSecOps solution for your apps on AWS from Snyk

AWS offers the infrastructure, innovation, services, and reliability to run your mission-critical applications, which is why millions of customers partner with AWS to build, run, and scale applications in the cloud. But how can customers proactively ensure the security of these critical applications?

How to integrate ASPM with your application security program

Application security posture management (ASPM) enables AppSec teams to continuously monitor, manage, and improve the security health of software applications throughout their lifecycle. It provides a framework for ensuring that applications are built securely from the start, maintained with security in mind, and continuously monitored for vulnerabilities that introduce significant risk to the business. With ASPM, we get aggregated data in a unified dashboard.

Hacktivists attack U.S. water treatment plant - analysis and implications

Almost a year ago to the day, on December 1 2022, Forescout Vedere Labs published a report detailing several hacktivist operations that targeted critical infrastructure in response to the Russian invasion of Ukraine and other geopolitical developments. Since the most recent chapter in the Hamas-Israel conflict started on October 7, there have been multiple similar claims of attacks from hacktivists taking opposing sides in the conflict.

Using eval to Calculate, Appraise, Classify, Estimate & Threat Hunt

I hope you're all enjoying this series on Hunting with Splunk as much as we enjoy bringing it to you. This article discusses a foundational capability within Splunk — the eval command. If I had to pick a couple of Splunk commands that I would want to be stuck on a desert island with, the eval command is up there right next to stats and sort. (Part of our Threat Hunting with Splunk series, this article was originally written by John Stoner. We’ve updated it recently to maximize your value.)

Cyber Week: Analyzing Internet traffic and e-commerce trends

Throughout the year, special events lead to changes in Internet traffic. We observed this with Thanksgiving in the US last week, where traffic dipped, and during periods like Black Friday (November 24, 2023) and Cyber Monday (November 27, 2023), where traffic spiked. But how significant are these Cyber Week days on the Internet? Is it a global phenomenon? Does e-commerce interest peak on Black Friday or Cyber Monday, and are attacks increasing during this time?

For want of a cyber nail the kingdom fell

An old proverb, dating to at least the 1360’s, states: "For want of a nail, the shoe was lost, for want of a shoe, the horse was lost, for want of a horse, the rider was lost, for want of a rider, the battle was lost, for want of a battle, the kingdom was lost, and all for the want of a horseshoe nail," When published in Ben Franklin’s Poor Richard’s Almanack in 1768, it was preceded by the cautionary words: “a little neglect may breed great mischief”.

What is Lookout Secure Private Access? A ZTNA Solution

Lookout Secure Private Access is a data-centric zero trust network access (ZTNA) that provides seamless connections to private apps – whether they reside on-premises or in the cloud – all while strengthening your data security posture. Watch this video to learn why you need ZTNA, how Lookout Secure Private Access works, and how it can protect your data no matter where it goes.

Unlocking Cyber Resilience: Strategies from the 2023 Global Ransomware Trends Report

Recent findings from the 2023 Global Ransomware Trends Report, reveal a concerning uptick: 85% of organizations experienced a cyberattack in the past year, up from 76% the previous year. Understanding the nuances of defense and recovery becomes paramount as cyber threats escalate. Join us for this essential discussion based on insights from one of the most extensive independent studies to date, encompassing 1,200 organizations from 14 different countries. All these organizations have one thing in common – they’ve braved cyberattacks.