Easily trigger Torq workflows on a set schedule. This is helpful for many use cases, such as pulling a threat intel feed at the same time every day or onboarding/offboarding employees once a week during off hours.
Torq natively supports dozens of vendors from which you can ingest events. But, we're flexible, so you can quickly create a webhook integration and ingest data from any service you need!
GitGuardian scans GitHub round the clock for companies' exposed secrets and alerts their security teams before it’s too late. This short demo shows exactly how GitGuardian's Public Monitoring platform can help you identify your developers on GitHub, even when using personal accounts, monitor your perimeter for secrets leaks, and help you collaborate with developers to remediate exposure.
Our Friends at Cybernews recently released some shocking research that showed thousands of Android applications are leaking hard-coded secrets like API keys. We are super excited to be sitting down with Cybernews researcher Vincentas Baubonis to take a deep dive into this study and uncover why this is such a pervasive vulnerability in Android Applications.
As you build more and more workflows the Workflows page can get a bit unruly. Learn some tips & tricks to easily navigate and manage your workflows list.
In any software development cycle, it is best practice to catch issues as early as possible since it both improves security and decreases the workload for both developers and security. In order to do this, CrowdStrike offers solutions for developers at build time that allow them to assess their Docker container images and review summarized report data integrated with their favorite CI/CD tools like Jenkins.
New vulnerability found in WooCommerece Gift Cards Premium Wordpress plugin with CVSS score of 9.8. Fin7 has developed an AI-powered automated attacking tool called Checkmarks. Checkmarks is designed to auto-attack ms exchange systems, perform post exploitation actions, and grab enough data to allow FIN7 to understand their victim.
Unfortunately, sometimes secrets get hard coded, committed, and pushed to your shared repositories. Do you know what to do when an incident occurs? In this high-level overview, we will walk you through the incident remediation process while leveraging the GitGuardian internal monitoring platform. This video covers: Definitions How to prioritize incidents How to investigate incidents and finally, an overview of the needed steps to remedy issues
Daniel dos Santos, Head of Security Research at Forescout's Vedere Labs, takes us through what came true from our 2022 cybersecurity predictions and looks ahead to what the cybersecurity landscape looks like for 2023.