Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Fix CWE-73? External Control of Filename

CWE, or Common Weakness Enumeration 73, occurs when an unauthorized user gains external access to control a file in your system. CWE provides a standardized language and classification system to help identify, understand, and mitigate vulnerabilities in software and systems. External Control of Filename or Path is a vulnerability that occurs when an application allows an external entity to influence the selection of a file or directory location within the system.

Cyber Espionage: Protect Your Business from Spies

One of the most serious risks that companies now must deal with is cyber espionage, when criminals use advanced methods to steal confidential data. In contrast to conventional cyberattacks, it frequently targets trade secrets, intellectual property, and private company information and is covert, persistent, and state-sponsored. An IBM analysis states that the average cost of a data breach in 2023 was $4.45 million, with its contributing significantly to these monetary losses.

CIEM: The Future of Cloud Infrastructure Entitlement Management

Cloud Infrastructure Entitlement Management is leading the charge in the fast-paced evolution of cloud security. The complexity of controlling user access and permissions increases as businesses grow their cloud environments. Traditional identity and access management (IAM) systems find it difficult to adapt to cloud infrastructure's constant changes. Security issues including insider attacks, misconfigurations, and over privileged accounts are brought on by this gap.

Making security a business value enabler, not a gatekeeper

The traditional perception of security within an organization is as a barrier rather than a facilitator, imposing approval processes and regulations that inevitably slow down operations. In this blog post, along with our friends at Knowit Experience, we explore how a new mindset keeps growing. One that embraces security as an enabler and a business value contributor.

Teleport's Evolution: Today's Name Changes Reflect a Strategic Shift in Infrastructure Security

As the world of infrastructure security grows more complex, maintaining clarity and precision in how we present our solutions is critical. Teleport’s platform's capabilities have expanded significantly over time. To better align with our mission and help customers understand the full potential of our platform, we are introducing new names for our product suite.

It's Finally Time to Embrace Trusted Computing

Does your corporate network treat users on VPNs as trusted regardless of who they are? Does your web server connect to its database as a fictitious user with a password in a config file somewhere? Or perhaps the most frightening scenario: did your platform engineer log in as root to configure your CI/CD pipeline toolchain? These three situations are all examples of anonymous users – someone taking action somewhere on your network or in one of your cloud accounts without identifying themselves.

CrowdStrike and Intel Partner with MITRE Center for Threat-Informed Defense in PC Hardware-Enabled Defense Project

The AI-native CrowdStrike Falcon platform is built to detect and protect against even the most advanced attacks. And as new research shows, it can further strengthen defenses when integrated with modern enterprise PC hardware.

How to Identify and Protect Personal Information

Personal information also referred to as personally identifiable information (PII) and Protected Personal Information (PPI), has a good and bad side for companies. All businesses record the personal information of their clients (names, debit/credit cards, address, etc.) to identify them and execute certain business operations. These business operations may range from meeting payrolls, to filling orders, and advertising. This makes the user and business operations run much faster and smoother.