Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Learning from cloud transformation as we move to AI

Development teams of all sizes are embracing the excitement and possibility of using AI tools to build software. Coding assistants like Google Gemini and Github Copilot have the potential to accelerate development like never before, and developers are adopting these tools — whether or not leadership has officially approved them. As your team considers the best ways to adopt this new technology, this transition might feel like déjà vu.

Lessons Learned About Secrets Protection After the Sisense Breach

Sisense is a popular monitoring tool that enables users to monitor business metrics from multiple third-party sources in a single dashboard. On April 10, the company informed customers that the sensitive information they entrusted with Sisense may have been compromised and urged them to reset their password and rotate their secrets. According to KrebsOnSecurity, the attackers were allegedly able to access GitLab repositories hosted by Sisense, where hard-coded secrets may have been found.

TruffleHog vs. Gitleaks: A Detailed Comparison of Secret Scanning Tools

TruffleHog and Gitleaks are popular secrets scanning tools that can automatically surface hardcoded secrets such as API keys, passwords, and tokens. They can both be integrated into the Software Development Lifecycle (SDLC) to proactively scan repositories to identify and rectify potential issues before they can be exploited. The need for effective secret detection tools underscores a broader shift toward more secure software development practices.

Remote Work Security: Trusting Employees and Protecting Data

With the rise of remote work, ensuring that employees are actually working from secure locations is more crucial than ever. This clip discusses the trust issues and risks associated with employees working from unapproved locations, highlighting the need for robust IT asset management and security protocols to protect sensitive data.

Understanding the Difference Between BDRSuite and BDRCloud

When it comes to backup and disaster recovery, Vembu offers two robust solutions: BDRSuite and BDRCloud. While both are designed to deliver comprehensive protection for your data, they cater for different deployment preferences. BDRSuite and BDRCloud are cost-effective and comprehensive backup and disaster recovery solution offering.

Windows 11 Boosts Security: NTLM Out, Kerberos In

Microsoft’s initiative to phase out NTLM authentication in favor of the more secure Kerberos protocol was originally announced back in October 2023. At that time, the Windows maker declared its intention to deprecate NTLM and encourage organizations to transition to Kerberos for authentication purposes across its ecosystem. Microsoft announced this week that later this year they are expecting to retire NTLM authentication in Windows 11.

Friday Flows Episode 26: Use AI to Summarize CISA Alerts

In this Friday Flows, Kevin Davis walks through a new story incorporating CISA’s catalog of known exploited vulnerabilities, filters them to identify the most critical ones, and then prioritizes and offers a concise summary for each vulnerability… using our new AI features! There are two main ways Tines has incorporated AI into workflow building: 1) "Automatic Mode" in our Event Transform action and 2) a new AI action.