Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Mend.io Launches Mend AI

Securing AI is a top cybersecurity priority and concern for governments and businesses alike. Developers have easy access to pre-trained AI models through platforms like Hugging Face and to AI-generated functions and programs through large language models (LLMs) like GitHub Co-Pilot. This access has spurred developers to create innovative software at an enormously fast pace.

Windows NT Lan Manager Hardening Best Practices

Windows New Technology LAN Manager (NTLM) is an outdated challenge-response authentication protocol developed by Microsoft. Despite being surpassed by Kerberos, NTLM remains in use as a form of Single Sign-On (SSO), allowing users to authenticate to applications without directly providing their passwords.

LAN Manager authentication level best practices

LAN Manager (LM) authentication level is a security setting that determines how Windows systems authenticate network connections. It is a legacy authentication protocol developed by Microsoft for use in older versions of Windows network operations. There are three main protocols involved in LAN Manager Authentication: The LAN Manager Authentication Level setting allows you to choose which protocols your system will use or accept for authentication.

The Kubernetes network policies you need today

In the dynamic world of Kubernetes, container orchestration is just the tip of the iceberg. In this sophisticated ecosystem, you must prioritize security efficiency. Kubernetes’ robust, open-source platform has been revolutionary in automating the deployment, scaling, and management of application containers. Yet, such capability comes with significant responsibility, particularly in network security. Here, the role of network policies becomes crucial.

Securing Your Network: RPC Endpoint Mapper Authentication and Hardening

This policy setting determines if RPC clients authenticate with the Endpoint Mapper Service when their call includes authentication data. The Endpoint Mapper Service on Windows NT4 (all service packs) is unable to process authentication data provided in this manner. Disabling this policy means RPC clients won’t authenticate with the Endpoint Mapper Service, but they can still communicate with it on Windows NT4 Server. The recommended state for this setting is: Enabled.

What is the difference between an SCA scan and a container scan?

Are Software composition analysis (SCA) scans and container scans the same thing? The short answer is yes… and no. A comprehensive container image scan applies SCA specifically to containers in combination with other analyses particular to containers, such as how they’re configured to deploy and the presence of secrets. Read on to learn the key differences.

Leveraging BoxyHQ's Open-Source SSO for Greater Market Reach and Compliance: MonkeyFit

In the ever-evolving tech landscape, companies face myriad challenges in scaling, security, and compliance. MonkeyFit's journey, as detailed in a comprehensive case study, demonstrates the power of strategic solutions in overcoming such hurdles.

Integrating Calico Image Assurance (Vulnerability Management) with Azure DevOps Build Pipeline

In cloud-native software development, ensuring the supply chain security of containerized applications in Kubernetes (K8s) environments is of utmost importance. With the continuous evolution of threats, safeguarding your containerized applications at every stage is not a choice anymore; it is an absolute necessity. With Calico’s vulnerability management, you can scan container images across three pivotal application lifecycle stages: Let’s break down the scanning guardrails offered by Calico.

SQL Server Orphaned Users - An Invisible Threat: Detection and Remediation Steps

Orphaned users in SQL Server arise when a database user is associated with a login in the master database that no longer exists and should be removed. This situation can happen when the login is removed or when the database is transferred to a different server lacking the corresponding login. The SQL Server logins existing on a server instance can be seen through the sys.server_principals catalog view and the sys.sql_logins compatibility view.

DevOps Security - Best Data Protection Practices

DevOps has already become an integrated part of almost every industry. Whether it’s technology, automotive, healthcare, or any other industry, it’s hard to imagine an organization that doesn’t rely on DevOps. Numbers speak better: the majority of consumers are from the technology sector – 44 %, yet there are a lot of organizations from other industries that depend on DevOps – financial, education, etc.