Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How To Manage Your Passwords

The most effective and secure way to manage your passwords is with a password manager. A password manager can help you manage your passwords by securely storing them and identifying weak and reused passwords, preventing you from falling victim to various cyberattacks. Continue reading to learn how to use a password manager and what to look for when choosing one.

CVE-2024-36680: SQL Injection Vulnerability in Facebook's PrestaShop Module Exposes Thousands of E-commerce Sites to Credit Card Fraud

PrestaShop is a free, open-source E-commerce platform launched in 2007. Built with PHP and MySQL, it offers customizable, scalable solutions for online stores. Features include product management, inventory tracking, and payment processing. Supporting multiple languages and currencies, it's ideal for small to medium businesses worldwide. Built by Promokit, the pkFacebook add-on integrates PrestaShop with Facebook, enabling product catalog sync, dynamic ads, and Facebook Shop creation.

How Much Should You Spend on Cybersecurity? A Rough Guide for Management, Board, or You

Last week I met with a Director of a European Bank. A question he asked me was "How much should we spend on Cyber Security"? As there is no one-size-fits-all answer to this question, I will try to break it down: Small Businesses (1-50 employees): Secure Your Startup/ SMB/ SME Medium Businesses (51-500 employees): Step Up Your Game Large Businesses (500+ employees): Go Big on Security Enterprise Level (5000+ employees): Fortify the Fortress Bonus Tips Practical Steps Invest in Cybersecurity.

The Ins and Outs of Cybersecurity Posture Assessment in 2024

Whether you're working with on-premises infrastructure, fully embracing the cloud, or running a hybrid solution, one thing is certain: a robust security posture is essential to safeguarding the environment. This article will explore today’s fundamentals of security posture assessment in both on-premises and cloud environments while briefly touching on the added complexities a hybrid setup will entail.

Ransomware, Supply Chain & Tech Threats Explode - 2024 Trustwave SpiderLabs Report

Trustwave SpiderLabs, in its just-released report 2024 Professional Services Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies, has uncovered an increasing number of ransomware, third-party supplier, and technology-based attacks targeting the professional services sector.

Top Remote Work Security Risks Every Organization Should Know

Remote work has become the new normal for many organizations worldwide. According to USA Today, approximately 14% of Americans now work from home, and around a third of all people who can work remotely choose to. Hybrid work is also increasing, with 41% of people splitting time between home and the office.

Professional Services Sector Under Attack - Trustwave SpiderLabs Report 2024

Recent research by Trustwave SpiderLabs, detailed in their newly published report "2024 Professional Services Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies," reveals a surge in ransomware, supply chain, and technologically sophisticated attacks aimed at the professional services industry.

Backtest detection rules with Datadog Cloud SIEM Historical Jobs

Every security engineer has experienced this issue: after spending a lot of time creating a new SIEM alert to catch malicious behavior, you deploy it, only to find there are over 100 service accounts triggering false positives. Your SIEM is suddenly flooded with false alerts, and your team is overwhelmed as a result. You then spend hours or even days investigating these alerts and fixing your detection rule, hoping it will work better next time.

Accelerate investigations with Datadog Cloud SIEM Risk Insights for AWS, GCP, and Azure entities

Managing dynamic cloud environments is an ongoing challenge for organizations as they scale and innovate. Protecting assets, data, and reputations is more important than ever, yet detecting insider threats, compromised accounts, and unusual behavior in an environment remains complex. Traditional SIEM solutions often focus on reactive, event-driven insights, but to meet today’s evolving needs, many teams are embracing proactive approaches like user and entity behavior analytics (UEBA).

Dependency Management vs Dependency Updates: What's the Difference?

It’s not uncommon to hear people refer to updating dependencies as “dependency management”. They’re not wrong; keeping dependencies up to date is a big part of dependency management, but it’s not everything. Read on to learn more about the differences between the two.