Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

December 2024

Protect Your Personal Information: Ensuring Privacy and Security

Data is everywhere in the digital realm, on cell phones, tablets, PCs, and Macs. Even smart TVs, game controllers, and home appliances have data now. With too much data being generated, should we protect all of this content or specific items relevant to protecting their personal security? Everyone using smart devices must understand how data is generated and how long we should keep the data. How can you determine if someone has compromised your data?

OWASP Kubernetes Top 10 : Everything to know About Risks & Mitigation

As open-source software, Kubernetes gives a platform to orchestrate containers or control application deployment in a containerized way, simplifying their running. It is a scalable and efficient system that automatically deploys and scales applications so the developers can focus on their coding. In contrast, the system takes care of other underlying infrastructure work.

Replace .env with 1Password SDKs: Get started with secure programming

At 1Password, we offer several developer solutions to make software development and deployments a smoother process. We’ve introduced tools like the tried-and-true 1Password CLI, which enables secure local development, and our SDKs so you can securely access your secrets from the cloud.

Securely Unlocking the Power of AI Skills in Microsoft Fabric

In today’s rapidly evolving digital landscape, the ability to harness the power of AI is becoming increasingly crucial for businesses. Within Microsoft Fabric, Microsoft recently added capabilities for building AI Skills, making it easier than ever for business users to create and integrate intelligent capabilities into your workflows to answer questions over lakehouse and warehouse tables. AI Skills are basically LLM engines that simplify interactions with data.

CVE-2024-47836: HTML Injection Vulnerability in Admidio User Management

On October 9, 2024, the security researchers at Astra Security found an HTML injection vulnerability in the messages section of the Admidio User Management solution. The vulnerability, assigned CVE-2024-47836, allows attackers to inject arbitrary HTML content into the application, which could manipulate webpage behavior, mislead users, and act as a precursor to further attacks.

Mock Data for Testing: A Critical Component for Software and AI Development

Mock data is an essential tool in software development and testing, offering realistic and secure alternatives to sensitive production data. Beyond traditional testing, mock data is now a cornerstone for AI development, where large datasets are critical for training and validation. By mimicking the properties of real-world data while ensuring privacy and compliance, mock data enables organizations to innovate without compromising security or trust.

MSSP Alert, CRN, and Comparably Honor Trustwave in 2024

Cybersecurity industry analysts were not the only group touting Trustwave. In 2024, a variety of media and workplace reviewing sources hailed Trustwave not only for our security solutions but as a great place to work. Because Trustwave is proud of how our employees perceive us let's take a look at the awards issued by Comparably, a leading workplace culture and compensation monitoring employee review platform. Trustwave was awarded three Comparably awards in 2024.

The Startup's Open-Source Guide to Application Security

Security can be a difficult, expensive world to navigate. So we decided to create a comprehensive guide of open-source security tools to cut through the bullsh*t and show what the most critical tools to implement are, what assets you need to protect, and how you can build a long-term security plan using only free and open-source tools.

Teach Yourself Kubiscan in 7 Minutes (or Less...)

While Kubernetes’ Role-based access control (RBAC) authorization model is an essential part of securing Kubernetes, managing it has proven to be a significant challenge — especially when dealing with numerous users and pods. Fortunately, KubiScan is here to help address this issue.

Uncovering the Hidden Dangers: Corporate Emails on Third-Party Websites

Employees often need to access various online services for work and personal purposes. Whether signing up for industry newsletters, registering for webinars, or using online tools, a corporate email address is a convenient way to manage professional communication. However, this seemingly harmless habit can expose employees and their organizations to significant risks.