Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to strengthen security in your CI/CD pipeline

DevSecOps refers to the integration of security practices into DevOps process. With modern development cycles, you can't afford to leave security until the end. It should be baked in at every stage. Continuous integration, continuous delivery (CI/CD) security is a big part of the DevSecOps picture. It's critical that you secure your pipelines and that the automated systems used to implement CI/CD are not vulnerable to attack.

Integrations with Tenable and Rapid7 Simplify Vulnerability Management

Security teams rely on vulnerability scanners to proactively locate vulnerabilities in network devices, hosts, and applications. These tools help improve the overall security posture of the network by remediating exposure before bad actors have an opportunity to exploit it. Although incredibly helpful, the data delivered by these tools is often overwhelming and not presented in an actionable manner.

Reality of Cyber Warfare: Twitter Echo Chambers

Join us as we explore a fascinating study conducted in the early 2010s, revealing the existence of echo chambers on Twitter. Delving into the world of social media dynamics, this study highlighted a stark divide between pro-Democrat and pro-Republican individuals, with limited connections bridging these two ideological bubbles. Fast forward to the present day, and the influence of echo chambers in our current social media ecosystem has only amplified. In this eye-opening video, we examine the implications of this polarization and its impact on public discourse.

Cyber Security Awareness Training for Employees

Every day, businesses grapple with phishing attacks, data breaches, and other cyber threats that can cause significant damage. These potential risks underscore the need for cyber security awareness training for employees. Such training isn't about identifying the weakest link, but about fostering a security-conscious culture where all staff members are informed and confident.

What is Virtualization in Cloud Computing

Virtualization refers to the creation of a simulated version of a device or resource, such as a server, desktop, storage device, operating system, or network resource, rather than an actual physical version. In simpler terms, virtualization is a strategy that enables multiple users and organizations to share a single physical instance of a resource or application. This is achieved by assigning a logical name to a physical resource and providing a pointer to that resource when needed.

Enhance SBOMs with runtime security context using Datadog Application Vulnerability Management

Software today relies heavily on open source, third-party components, but these reusable dependencies sometimes inadvertently introduce security vulnerabilities into the code of developers who use them. Some of the most serious vulnerabilities discovered in recent years—like the OpenSSL punycode vulnerability, Log4Shell (Log4j), and Dirty Pipe (Linux)—reside in popular open source packages, making them so widespread that they could compromise almost the entire software ecosystem.

How social media compromises information security

Today’s companies operate in a complex security environment. On the one hand, the threat landscape is growing. Bad actors are becoming more and more refined as they get access to new tools (like AI) and offerings (like hacking-as-a-service). On the other hand, companies are dealing with more sensitive data than ever before. This has prompted consumers and regulators alike to demand for better security practices.