Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Product update: IDcentral's Liveness Detection

Concepts like AI-based video editing and augmented video processing are not just buzzwords anymore. Fraudsters now have easy access to plug-and-play products that enable them to use the power of deep learning and advanced AI to anonymize, mask, and alter images and videos. These spoofs also known as presentation attacks include printed photos, cutout masks, digital and video replay attacks, and 3D masks.

Visibility and Security for GKE Autopilot

GKE Autopilot from Google Cloud is a mode of operation in Google Kubernetes Engine (GKE) designed to simplify working with Kubernetes in the cloud. Pairing secure DevOps practices with GKE Autopilot will help you and your teams ensure the security, compliance, and performance of your workloads and applications. Sysdig has collaborated with Google Cloud to enable visibility and security for GKE Autopilot and your containers.

Top 7 Security Risks of a Low Code Development for your Enterprise

Who would hate the quick and easily applicable way to create application software? How is it even possible? Doesn't application development demand countless planning, design, testing, and most crucial thing, codes? Well, there was a time when it was required, but now, the low-code development approach helps enterprises build an app with little to no code. Sounds fantastic, right? The low-code development expedites business results and empowers them by speeding up the development of new applications.

Accelerate Troubleshooting, Forensics and Response With Fast and Efficient Search

Whether you’re diagnosing a system outage, mitigating a malicious attack or trying to get to the bottom of an application-response-time issue, speed is critical. Pinpointing and resolving issues quickly and easily can mean the difference between success and crisis for any business, regardless of size or industry. Network and system administrators, security professionals and developers all depend on detailed log data to investigate issues, troubleshoot problems and optimize performance.

Cybersecurity in the Year Ahead: Trustwave 2022 Cybersecurity Predictions - APAC Edition

This is part 3 of Trustwave’s 2022 Cybersecurity Predictions blog series brought to you by our APAC team. In 2021, the cybersecurity industry was truly tested. Most notably, we uncovered the deeper fallout from the SolarWinds attacks, combatted the proliferation of advanced ransomware gangs and a surge in vulnerability exploitation, and saw fragile supply chain and critical infrastructure more targeted by attackers than ever.

Simplifying detection of Log4Shell

Security workers across the world have been busy since last Friday dealing with CVE-2021-44228, the log4j 0-day known as Log4Shell, that is already being heavily exploited across the Internet. Given the huge number of systems that embed the vulnerable library, the myriad ways that attackers can exploit the vulnerability, and the fact that automated exploitation has already begun, defenders should expect to be dealing with it for the foreseeable future.

Mitigating Industrial Production Risk with Tripwire

It seems that the most popular topics in cybersecurity for the last year has been zero trust as well as the convergence of Information Technology (IT) and Operational Technology (OT). These developments are good, as they signal some positive motion towards better overall security. Some of the current risks are worth noting, with a forward glance to protecting specific industries such as oil and gas production plants.

2021 Devo SOC Performance Report: SOC Leaders and Staff Are Not Aligned

The third annual Devo SOC Performance ReportTM shows that working in a security operations center continues to be painful. Based on an independent survey of more than 1,000 global cybersecurity professionals commissioned by Devo and conducted in September 2021, the report examines current SOC trends and challenges.

Cybersecurity Sessions #2: Drone Safety and Cybersecurity

With drones now capable of massive cluster displays at events like the Olympics opening ceremony, and being used in sectors like healthcare, what role does cybersecurity play in making these devices safe? In this month’s episode of the Cybersecurity Sessions podcast, Andy talks to drone pilot and experienced cybersecurity expert Frank Jones about the emerging technology of drones, their growing list of use cases and how important security is in their wider adoption.

Splunk SOAR Playbooks: TruSTAR Indicator Enrichment

SOAR use cases come in all shapes and sizes, but almost all of them rely on threat intelligence to determine the risk posed by the various indicators in the event. Our two new community playbooks leverage Splunk Intelligence Management (previously TruSTAR) to gather intelligence about indicators and enable rapid manual response by an analyst within a single prompt.