Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Help stop data leaks with the Forseti External Project Access Scanner

Editor’s note: This is the second post in a series about Forseti Security, an open-source security toolkit for Google Cloud Platform (GCP) environments . In our last post, ClearDATA told us about a serverless alternative to the usual way of deploying Forseti in a dedicated VM. In this post, we learn about Forseti’s new External Project Access Scanner. With data breaches or leaks a common headline, cloud data security is a constant concern for organizations today.

The Power of Vulnerability Management: Are You Maximizing Its Value?

Tripwire has been in the business of providing vulnerability management solutions with IP360 for about 20 years. With over 20,000 vulnerabilities discovered last year alone, vulnerability management continues to be an important part of most security plans. And most organizations agree.

Understanding Vulnerability Scoring to Help Measure Risk

Understanding vulnerability scoring can be a daunting task, but a good starting point is first understanding risk and being able to distinguish risk from a vulnerability. Both have been used interchangeably throughout the years. A vulnerability is some aspect of a systems functioning, configuration or architecture that makes the resource a target of potential misuse, exploitation or denial of service.

What's better: On-site SIEM or MSSP SIEM?

If an organization properly implements a SIEM solution, it efficiently draws attention towards warning signs as well as suspicious activity within the network. With the ever-evolving cyber space, continuous security monitoring has become exceedingly important. The benefits of SIEM also extend to understanding business and technology environments, monitoring availability and performance, issue diagnosis, and creation of a report on network activities.

How to Ensure Network Security?

With a colossal surge in cyber-attacks and high reliance on technology in this digital age, ensuring the security of data and information have become a daunting task. Cyber threats are accelerating significantly even faster than the enhancements businesses are making. Computer networks have become bigger and their interconnectivity using a Wide Area Network (WAN) is worldwide due to globalization.

Meet the Hacker: EdOverflow, motivated by community and knowledge sharing

EdOverflow is known for contributing a bunch of stuff: active in the community, one of the people behind security.txt – a standard for structuring responsible disclosures, bug bounty hunter and a member of Detectify Crowdsource. We got a chance to quiz him about security.txt, his motivates for being involved with hacking communities and why he chooses to report to responsible disclosure programs without bounty rewards.

There is no Artificial Intelligence without Machine Learning

Machine learning (ML) technology has the potential to generate tremendous value for businesses. It is already proving itself in the market and powering a growing number of tools across virtually every industry. In order to discuss the current capabilities of ML, we must first examine how it relates to artificial intelligence (AI). Then, we can explore where ML software is today, its real-world applications, and how it’s transforming business.