Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Key Learnings from the Disney Breach: 5 Ways to Stop Secret Sprawl

Do you have secrets sprawled across your tech stack? The recent Disney breach is as good a reminder as any to check, because it’s likely that you do. But first, let’s take a closer look at the Disney breach to understand what may have gone wrong, and how you can prevent a similar breach from happening to your business.

Friday Flows Episode 27: Disabling AWS User from Hunters Alert with Jira Prompt

We're excited to bring you another workflow from the Tines library and to introduce your new Friday Flows host Cameron Higgs! The legendary Blake Coolidge is handing over the reins for a season but he'll be back on your screens before too long. In this episode, Conor Dunne walks Cameron through a workflow that pulls leads related to the Amazon Web Services (AWS) environment flagged by Hunters and searches for users with unauthorized permissions.

Detect SSRF attacks in cloud applications and APIs

APIs can be vulnerable to a wide variety of attacks, such as poor inventory management and access controls, making them a primary target for attackers. Server-side request forgery (SSRF) is one type of attack that has become more prominent with the rising use of public clouds. This is primarily due to new development practices like using Instance Metadata Services (IMDS) to access valuable information about deployed instances, such as credentials.

10 Dimensions of Python Static Analysis

Python static analysis, also known as "linting", is a crucial aspect of software development. It involves inspecting your Python code without running it to identify potential bugs, programming errors, stylistic issues, or non-adhering patterns to predefined coding standards. It also helps identify vulnerabilities early in the development process, reducing the chances of deploying insecure code into production.

HTX Integrates Fireblocks Off Exchange

HTX is the latest global exchange to integrate with Fireblocks Off Exchange, a first-of-its-kind solution that enables trading firms and asset managers to mitigate counterparty risk while trading on centralized exchanges. Through integrating with Off Exchange, HTX looks to strengthen their digital asset security, streamline global compliance operations, and create a better virtual asset trading experience for their users.

How to Improve Compliance with Multilingual Cybersecurity Resource

Cybersecurity matters a lot today, and it touches everyone around the globe. With hackers becoming smarter, protecting information has never been more critical. Now, imagine trying to stay safe online but not understanding the warnings because they’re not in your language. That’s where multilingual cybersecurity comes into play – it breaks down language barriers so everyone can understand how to protect themselves.

The CIA Triad: Confidentiality, Integrity, and Availability

The confidentiality, integrity, and availability (CIA) triad is a critical concept in cybersecurity, including three fundamental principles that help protect information. Organizations seeking a starting point for developing an information security framework would benefit from the triad model.

The 11 Best Encrypted Cloud Storage Solutions 2024

No matter what information is being transmitted online, whether you send files, text messages, or upload files to back up in the cloud, the only way to guarantee secure data transmission is by using encrypted services. Encrypted cloud storage is the best method to store your files securely. However, not all cloud services offer the same levels of encryption, resulting in a less private storage method.