Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar - Zero-Day, DDoS, Bot & API Attack Trends

We analyzed 1 billion+ #zeroday, #DDoS, #API, and #bot attacks on 1400+ applications blocked in Q1 2023. And it's a 30% bump over Q4 2022! In this webinar, Vivekanand Gopalan, VP of Product Management, unfolds the findings after analyzing these attacks and gives actionable tips to protect businesses from emerging threats.

Sysdig Training series - Introduction to Sysdig Secure

Kicking off our training series, this video offers an overview of the Sysdig Secure product, highlighting its capabilities in meeting compliance standards, managing vulnerabilities, and detecting threats within cloud and Kubernetes environments. Learn how Sysdig Secure's real-time visibility and automation aid in enhancing security posture and efficient incident handling in your infrastructure.

Trustwave DbProtect and MailMarshal Named Finalists for SC Media and SC Europe Awards

SC Media and SC Media Europe have named two of Trustwave’s premiere products, DbProtect and MailMarshal, as a finalist in several award categories the cybersecurity media outlet plans to announce this summer. For 26 years, the SC Awards program has been cybersecurity’s most prestigious and competitive program, recognizing the solutions, organizations, and people driving innovation and success in information security.

Cybersecurity Asset Inventory in Your Home

Back in 2015, we published an article about the third party risks that are introduced into a home network. Now, eight years later, it is a good time to revisit the landscape of the home network. If we think about the technology in most homes in 2015, it was fairly sparse, consisting only of a router with an internet connection. The speed of most home internet connections was well below 100Mbps.

TA569: SocGholish and Beyond

TA569 is a prolific threat actor primarily known for its deployment of website injections leading to a JavaScript payload known as SocGholish. In the past few months, Proofpoint researchers have observed changes in the tactics, techniques, and procedures (TTPs) employed by TA569. Changes include an increase in the number of injection varieties, as well as payloads deviating from the standard SocGholish “Fake Update” JavaScript packages.

An Update on Section 230 - The 443 Podcast - YouTube Short

In this week's episode, we look back to our initial monologue on Section 230 protections that allow social media and the Internet to function. We cap off the episode replay with a new discussion on a recent Supreme Court case that has the potential to dramatically impact the Internet as we know it.

Key Insights Into Gartner Report: How to Select DevSecOps Tools for Secure Software Delivery

With the advent of complex technology ecosystems like agile development processes, cloud-native platforms, and the rising use of open-source software, the importance of continuous Security and compliance has increased more than ever. As a result, leaders in the software industry must advise their teams to incorporate developer-friendly security tools into their DevSecOps pipelines.

Package Provenance: Know the origin

In an era where high-profile security incidents involving the software supply chain have become all too common, the need for robust tools and practices to secure the software we rely on has never been more evident. One crucial aspect of ensuring supply chain security is package provenance, which allows for the tracking of the origin and authenticity of software packages.