Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What does Code Signing Certificates Cost?

In this article, you will see that how much does a Code Signing certificates cost and the list of most trusted code signing certificates. Technology is something that the world is driven by. Whether it is a trivial task or a big one, the application of the software is quite the norm. Unfortunately, as technology advances, the rate of cybercrimes is increasing as well. Fortunately, people have also started becoming aware of these fraudulent attacks and adopting precautions.

Halloween Special - Spooky Videos - Real or Fake? Razorthorn Team Reactions

It's Halloween once again and that means it's time for some spooky ghost videos, chilling true scary stories and unbelievable caught on camera horror stories! In this special Halloween edition of our channel, you'll get to watch some of the scariest ghost videos recently recorded along with your host, James Rees, and two of the Razorthorn team, Amy Tate and Jite Okoh. So grab your Halloween costumes and get decide for yourself - are they real?

Stolen Passwords and Ransomware Attacks: How Small Businesses Can Protect Themselves

Stolen passwords and compromised credentials are among the leading causes of ransomware attacks. In 2021, the IC3 received 3,729 complaints identified as ransomware, with more than $49.2 million in adjusted losses. Startups and small business enterprises (SMEs) must take preventative measures to lower their risk of a ransomware attack. Keep reading to learn more about ransomware and what steps your company can take to protect itself.

Planning Your Log Collection

Whether you are planning to use Graylog for security and threat hunting, IT Operations analysis and reporting, or any other use case, getting your logs into Graylog is essential. The process of log collection is sometimes a daunting task, especially if you are planning to collect massive amounts of data. But if you take a minute to answer some key questions before you begin, you can transform the log collection task from daunting to smooth sailing. Here we go with the questions…

Top 5 scary AWS misconfigurations

In 2022, AWS (Amazon Web Services) remains one of the dominant cloud platforms and continues to be recognized as a leader in Cloud Infrastructure and Platform Services. AWS accounts for 34% of the cloud infrastructure service providers, so many organizations today have either all, most, or at least some of their infrastructure on AWS.

How to create SBOMs in Java with Maven and Gradle

When building applications in Java, we highly depend on external libraries and frameworks. And each Java package that is imported likely also depends on more libraries. This means that the amount of Java packages included in your application is often not really transparent. As a developer, these nested (transitive) dependencies create the problem that you probably do not know all the libraries you are actually using.