Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detect cross-account access risks in AWS with Datadog

Managing access across multiple AWS accounts is a popular approach to isolating workloads and data. While it provides several benefits to organizing the various operational requirements for the environment, it introduces additional complexity for managing IAM policies and workload permissions. A primary concern is assigning too many permissions to any one source, which increases the risk of an attacker moving within the environment undetected.

A Basic Guide to SQL Server Security Fundamentals

Organizations today collect and generate enormous volumes of sensitive data. Much of it is stored in SQL Server databases, making SQL Server security management crucial for protecting critical applications and services. Implementing strong Microsoft SQL Server security measures helps organizations defend against cyber threats and comply with regulations like GDPR, HIPAA, and PCI DSS.

Enhanced VRM solution unlocks how organizations manage, monitor, and maintain oversight of third-party risk

It’s no secret that managing vendor risk is one of the most challenging aspects of any security program—our most recent State of Trust report found that one in two businesses have terminated a vendor relationship due to security concerns. The rapid proliferation of SaaS tools and AI technologies only ups the ante by increasing the complexity of vendor monitoring and oversight. ‍

Alert: Phishing Attacks Use New JavaScript Obfuscation Technique

Researchers at Juniper Threat Labs warn that phishing attacks are utilizing a new obfuscation technique to hide malicious JavaScript. “While investigating a sophisticated phishing attack targeting affiliates of a major American political action committee (PAC) in early January 2025, Juniper Threat Labs observed a new JavaScript obfuscation technique,” the researchers write.

Q&A with Martin Kraemer on Information Sharing in Cybersecurity

Recently, Dr. Martin J. Kraemer, Security Awareness Advocate at KnowBe4, and Dr. William Seymour, Lecturer in Cybersecurity at King’s College London released a Whitepaper called: “Cybersecurity Information Sharing as an Element of Sustainable Security Culture,” which examines how people consume and share cybersecurity information, revealing the role that workplace training plays in fostering information sharing among colleagues.

The Microsoft Security Score: The Future Benchmark of Enterprise Security and Trust

Trustwave has engaged with hundreds of enterprise customers across Australia and worldwide, and one overarching theme continues to emerge. Cybersecurity is no longer an IT problem; it is a core business concern. Executives, board members, procurement teams, and even marketing departments are beginning to realize that security is not just about preventing breaches but about establishing trust, enabling business, and gaining competitive advantage.

Connect and secure from any network to anywhere

Build your new corporate network with Cloudflare, connecting any network into our modern SASE platform. In this video learn all the different methods of connecting networks to Cloudflare and what services can then be used to improve security and performance. Chapters: Watch the rest of the videos in our series to learn more about Cloudflare's SASE platform. Dive deep into the architecture of how our SASE platform works by reading our reference architecture content.

Jit + Orca Security: Correlate Cloud and Application Security for Smarter Risk Management

Today, we’re excited to announce Jit’s integration with Orca Security! This partnership enables security teams to correlate cloud security risks with application security risks to understand how the security of one resource impacts another. Security teams today struggle with siloed tools and security insights, as well as inconsistent prioritization methods across tooling.

It's Time Developers Say Goodbye to Code Vulnerability Backlogs

Without the widespread developer adoption of security tools, it's extremely difficult to build secure applications in the cloud. Developers aren’t security experts, which is why development teams will leverage application security tools – like SAST, SCA, IaC Scanning, secrets detection, and other technologies – to scan their code and surface vulnerabilities. These tools are often resisted by developers.

Announcing the Launch of the COR Compliance Package: Stay Ahead of DORA Regulations

Starting this year, financial institutions (FIs) and crypto-asset service providers (CASPs) in the EU are now required to ensure compliance with complex frameworks that protect digital infrastructure and financial services.