Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Application Security - The Complete Guide

Application security is an essential part of the software development lifecycle, and getting it right should be a top priority in today’s ever-evolving and expanding digital ecosystem. Application security is the practice of protecting your applications from malicious attacks by detecting and fixing security weaknesses in your applications’ code.

How to Securely Share Passwords with Team Members

Sharing a Netflix account between family members might not seem like a big deal, but shared accounts can put you at risk. Individual users should consider that sharing login details can increase the chances of your details getting into the wrong hands. Shared access between family members is one thing, but what about shared accounts between co-workers?

Securing Windows workloads

Containers are a great way to package applications, with minimal libraries required. It guarantees that you will have the same deployment experience, regardless of where the containers are deployed. Container orchestration software pushes this further by preparing the necessary foundation to create containers at scale. Linux and Windows support containerized applications and can participate in a container orchestration solution.

Latest LastPass security breach highlights developers as a high-value target

Last August, the maintainers of the LastPass cloud-based password manager tool reported a security breach in their servers. The disclosure maintained that an unauthorized party gained access to the LastPass development environment through a single compromised developer account. However – while source code and technical information was stolen, no user data was compromised and no services were interrupted. This specific statement about user data was reiterated many times.

Enterprise Remediation with CrowdStrike and MOXFIVE, Part 2: Strategies for Containing and Recovering

In Part 1 of this blog series, we highlighted the benefits of CrowdStrike’s investigative approach and the CrowdStrike Falcon® Real Time Response capabilities for avoiding a significant incident in the first place, and minimizing the damage should an attacker gain entry into your environment. We also explored a range of governance and process-oriented steps that are often left out of technology-centric discussions on incident response preparedness.

The Value of Cybersecurity Professional Services for Organizations

Cybersecurity is a trending topic among boards and executives. Yet, many organizations need more technical capabilities to prepare and respond effectively to cyber incidents and regulatory requirements. Let’s explore what cybersecurity professional services really are and how they can help take an organization’s security to the next level.

A Closer Look at Hybrid Work Environments and Cyber Insurance Coverage

Organizations seeking cyber insurance coverage are typically required by their insurer to provide evidence of a panoply of controls around information security, disaster recovery, and related risk and technology requirements and best practices.