Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cybersecurity Awareness Month: Recognize and Report Phishing

While phishing attacks are nothing new, the methods used to execute them are constantly evolving. Today, hackers are taking advantage of automation and other advanced techniques to increase the scale of phishing campaigns and better target victims. In this video, we dive into the importance of recognizing and reporting phishing attempts.

Cloud security fundamentals part 3: Empower your developers

In our previous blog breaking down The 5 Fundamentals of Cloud Security, we looked at the value of prevention and secure design. Mapping resource relationships and enforcing security guardrails throughout development helps greatly reduce an available attack surface. But who will enforce these guardrails when your security team is busy with other work? This should be where developers are able to step in. So let’s look at another vital element in cloud security: empowering developers.

Meticulous Prep and Planning-A Linchpin of Modern AppSec Programs

This is the second of a six-part blog series that highlights findings from a new Mend white paper, Five Principles of Modern Application Security Programs. Be sure to look out for our upcoming blogs on each of the five principles. It’s no exaggeration to say that IT and application security teams from all organizations are facing a perfect storm.

Shining a Light on Bots (From 'Phishy Business') | Cybersecurity Sessions bonus episode

Bonus episode: Cybersecurity Sessions host Cyril Noel-Tagoe was recently featured on the Mimecast podcast series Phishy Business. Cyril joined hosts Alice Jeffery and Brian Pinnock, plus fellow guest, Mimecast Senior Product Manager Dr Kiri Addison, for a fascinating conversation about bots and what they are used for (both good and bad). About Phishy Business

Add security context to observability data with Datadog Cloud Security Management

Organizations are rapidly migrating their infrastructure to the cloud, enabling them to modernize their applications and deliver more value to their customers. But this transition creates significant security risks that they may be unable to keep pace with. For example, cyber attacks on cloud resources are becoming more sophisticated and prevalent. Additionally, organizations often rely on legacy, disjointed security tools that don’t integrate well with cloud-native infrastructure.

Manufacturing Overtakes Financial Services As The Sector With Fewest Software Security Flaws

72 percent of applications contain vulnerabilities, and 12 percent are considered 'high severity' - the lowest of all industries analyzed. Sector still has room for improvement, with some of the lowest and slowest fix rates, especially for open-source flaws.

Group Scope in Active Directory

IT pros are well aware that Active Directory has two types of groups: security groups, which are used to assign permissions to shared resources, and distribution groups, which are used to create email distribution lists. But not everyone understands that each of these Active Directory groups has a scope — and understanding how scope works is vital to security and business continuity. This blog post dives into what group scope is and exactly why it’s important.