Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

[Webinar] Exposing Leaked Secrets Inside Android Apps! Cybernews & GitGuardian

Our Friends at Cybernews recently released some shocking research that showed thousands of Android applications are leaking hard-coded secrets like API keys. We are super excited to be sitting down with Cybernews researcher Vincentas Baubonis to take a deep dive into this study and uncover why this is such a pervasive vulnerability in Android Applications.

Application Security - The Complete Guide

Application security is an essential part of the software development lifecycle, and getting it right should be a top priority in today’s ever-evolving and expanding digital ecosystem. Application security is the practice of protecting your applications from malicious attacks by detecting and fixing security weaknesses in your applications’ code.

Securing your Jenkins CI/CD Container Pipeline with CrowdStrike

In any software development cycle, it is best practice to catch issues as early as possible since it both improves security and decreases the workload for both developers and security. In order to do this, CrowdStrike offers solutions for developers at build time that allow them to assess their Docker container images and review summarized report data integrated with their favorite CI/CD tools like Jenkins.

Amazon EFS Backup and Restore for Amazon EKS

Amazon Elastic File System (EFS) is a simple, scalable and fully managed file storage service to support the storage and throughput needs of your Kubernetes applications. Amazon EFS is designed to be highly available and durable, however your EFS data can still be prone to data loss, data corruption, and have compliance issues. Amazon EFS Backup and Restore of data helps protect against data loss due to hardware failures, accidental deletion, ransomware attacks, or other types of disasters.

Securing your Jenkins CI/CD Container Pipeline with CrowdStrike

In any software development cycle, it is best practice to catch issues as early as possible since it both improves security and decreases the workload for both developers and security. In order to do this, CrowdStrike offers solutions for developers at build time that allow them to assess their Docker container images and review summarized report data integrated with their favorite CI/CD tools like Jenkins.

Everything You Need to Know About Application Security Best Practices

Software applications are the weakest link when it comes to the security of the enterprise stack. In The State of Application Security, 2022, Forrester reports that the majority of external attacks occur either by exploiting a software vulnerability (35 percent) or through a web application (32 percent). Source: Forrester: The State of Application Security 2022

Remediating Incidents with GitGuardian

Unfortunately, sometimes secrets get hard coded, committed, and pushed to your shared repositories. Do you know what to do when an incident occurs? In this high-level overview, we will walk you through the incident remediation process while leveraging the GitGuardian internal monitoring platform. This video covers: Definitions How to prioritize incidents How to investigate incidents and finally, an overview of the needed steps to remedy issues

Cluster Autoscaling During Kubernetes Backup and Recovery

Companies often see seasonal business spikes with periods of increased on-line demand or activity. To meet the changing application demands, Kubernetes has become the platform of choice to automatically scale web applications and infrastructure up and down. Autoscaling in Kubernetes adjusts the resources that are available to run the application or service, while minimizing the cost of those resources.

CVE-2022-47633: Kyverno's container image signature verification can be bypassed by a malicious registry or proxy

Security researchers at ARMO have found a high-severity vulnerability in the Kyverno admission controller container image signature verification mechanism. The vulnerability enables an attacker who is either running a malicious container image registry or is able to act as a proxy between the registry and Kyverno, to inject unsigned images into the protected cluster, bypassing the image verification policy. The vulnerability was introduced in version 1.8.3 and was fixed in version 1.8.5.

Secure your application development with AWS and Mend

Mend, formerly known as WhiteSource, effortlessly secures what developers create. Mend uniquely removes the burden of application security, allowing development teams to deliver quality, secure code, faster. With a proven track record of successfully meeting complex and large-scale application security needs, the world’s most demanding software developers rely on Mend. The company has more than 1,000 customers, including 25 percent of the Fortune 100, and manages Renovate, the open source automated dependency update project.