Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Why outdated access control is putting your data at risk

Imagine this: you wake up to a notification – your company has suffered a data breach. Fear sets in as you think about what this means: customer data exposed, your company’s reputation damaged, and big fines on the horizon. In today’s digital landscape, this scenario is too common. Organizations worldwide face penalties for non-compliance with regulations, such as fines of up to $50,000 per incident for violating HIPAA.

How To Manage Your Passwords

The most effective and secure way to manage your passwords is with a password manager. A password manager can help you manage your passwords by securely storing them and identifying weak and reused passwords, preventing you from falling victim to various cyberattacks. Continue reading to learn how to use a password manager and what to look for when choosing one.

Backtest detection rules with Datadog Cloud SIEM Historical Jobs

Every security engineer has experienced this issue: after spending a lot of time creating a new SIEM alert to catch malicious behavior, you deploy it, only to find there are over 100 service accounts triggering false positives. Your SIEM is suddenly flooded with false alerts, and your team is overwhelmed as a result. You then spend hours or even days investigating these alerts and fixing your detection rule, hoping it will work better next time.

Accelerate investigations with Datadog Cloud SIEM Risk-based Insights and AWS Entity Analytics

Cloud environments today continue to grow in size and complexity, which increases the demand for improved security coverage in order to protect an organization’s assets, data, and reputation. This growth has also created significant and complex challenges in identifying insider or external threats, compromised accounts, and anomalous behavior across environments.

CVE-2024-36680: SQL Injection Vulnerability in Facebook's PrestaShop Module Exposes Thousands of E-commerce Sites to Credit Card Fraud

PrestaShop is a free, open-source E-commerce platform launched in 2007. Built with PHP and MySQL, it offers customizable, scalable solutions for online stores. Features include product management, inventory tracking, and payment processing. Supporting multiple languages and currencies, it's ideal for small to medium businesses worldwide. Built by Promokit, the pkFacebook add-on integrates PrestaShop with Facebook, enabling product catalog sync, dynamic ads, and Facebook Shop creation.

The 5 Industries Most Vulnerable to Data Breaches in 2024

As we pass the halfway mark of 2024, data breaches remain on the rise. Cybercriminals are finding more and more inventive ways to infiltrate organizations, exploiting vulnerabilities in networks, software, and human behavior. From phishing schemes and ransomware attacks to insider threats and supply chain compromises, the threat of cyber attacks continues. This is bad news, especially for certain industries. The consequences of these breaches extend far beyond financial losses.

Dependency Management vs Dependency Updates: What's the Difference?

It’s not uncommon to hear people refer to updating dependencies as “dependency management”. They’re not wrong; keeping dependencies up to date is a big part of dependency management, but it’s not everything. Read on to learn more about the differences between the two.

Splunk .conf24 reflections - Federated data, resilience, and a parade of fezzes

Fresh from the recent.conf24 user conference in fabulous Las Vegas, I thought I’d share what I thought were some of the key points throughout the week. Along with admiring the traditional display of fezzes and capes throughout the week, we were excited about the great conversations with our customers, business partners, Splunkers, and, of course, the lovely Buttercup.