Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

From DSOMM Theory to Practical Enforcement: A DevSecOps Journey

At Jit, we have often spoken about different security frameworks and standards, and how they apply to practical security. One of the aspects we like to look at closely when exploring security frameworks, is the way in which engineering teams can take these good practices and apply them to their day-to-day engineering work. Essentially, how to codify or operationalize these practices.

Splunk User Behavior Analytics (UBA) 5.4 Delivers FIPS Compliance and Advanced Anomaly Detection

Splunk’s latest User Behavior Analytics (UBA) product update, version 5.4.0, brings enhancements and new features designed to streamline operations and improve threat detection accuracy. Let’s see what’s new!

Global DDoS Weapons in 2024: Bots Run Wild

What do you get when you bring soaring numbers of connected devices online around the world—more than 29 billion by 2027? For consumers and businesses, the Internet of Things (IoT) promises a life of ever-increasing convenience, efficiency, and insight. Unfortunately, cybercriminals have just as much to celebrate.

kntrl integrates Open Policy Agent

Addressing the security intricacies of sophisticated automation frameworks, in our case the Continuous Integration/Continuous Deployment (CI/CD) environments, is always challenging. The inherent complexity of such environments, characterized by the multitude of components that are each performing distinct tasks, necessitates a dynamic and adaptable rule engine to ensure the security of our pipelines.

Creating a Vendor Risk Assessment Framework (6-Step Guide)

Vendor Risk Assessment processes form the core of a Vendor Risk Management program. As such, the efficiency of a VRM program is ultimately dependent on the design of its risk assessment processes. This post guides you through the design of an efficient vendor risk assessment framework in six steps. By implementing this framework, you can establish an efficient risk assessment workflow built upon a scalable process foundation. Learn how UpGuard streamlines vendor risk assessments >

Vendor Risk Management Examples

You understand the importance of a Vendor Risk Management strategy in mitigating the impact of third-party data breaches. However, you’re still unsure about its application to different vendor cyber risk contexts. To help you bridge this application gap and leverage the complete benefits of a Vendor Risk Management process, this post outlines three common examples of vendor security risks and how a VRM program could be tailored to address them. Learn how UpGuard streamlines Vendor Risk Management >

What is the MITRE ATT&CK framework?

As a kid, treasure hunts were fun. Someone gave you clues and a map so you could hunt down whatever hidden item they left for you. However, as a security analyst, your incident investigations often have clues but lack a map. An alert fires. You search through your vast collection of log data. You hope to find the next clue while trying to figure out the attacker’s next steps.

Strengthening ANZ's Critical Infrastructure Sectors Against Cyber Threats in 2024

As 2024 continues forward, Australia and New Zealand’s critical infrastructure sectors face significant cybersecurity challenges. Critical infrastructure (CI) sectors–encompassing energy, healthcare, transportation, water, and communication–are at a pivotal moment in their evolution. The rapid digitisation of these sectors brings not only unprecedented efficiency and connectivity but also a significantly expanded attack surface.