Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Developer's Guide to Serverless Security

Serverless computing brings a highly efficient way to deploy applications and run software on demand. Testament to that is the fact that serverless application adoption is increasing significantly over the years, with at least 1 in 5 organizations using FaaS (Function as a Service) in major Cloud providers such as Amazon, Azure & GCP.

Recent Developments in Data Security Laws in Africa

The pandemic has caused havoc on business and personal lives. It also highlighted the importance of personal data and its vulnerability. To combat this, governments across the globe have reviewed and modulated their privacy laws and regulations. Including the African governments and legislators. Over the recent years, Internet usage has increased significantly on the African continent. The usage was aided by continued investment in local digital infrastructure and improved user access.

Graylog Security - The Affordable SIEM Alternative

Cyber resiliency is the new norm in cybersecurity. Nothing can be 100% secure, and you’re looking for a cost-effective solution to enhance your security posture. At the same time, the rapidly expanding cybersecurity technology market makes it hard to find something that best fits your needs. Most people looking at Security Information and Event Management (SIEM) platforms want a tool that gives them high fidelity alerts to prevent their security analysts from drowning in false positives.

Enhanced Network Evidence for the Modern SOC

Security leaders protect their businesses by using analytics and insights to understand security needs, attack surfaces, and trends. Every company from ‘big box’ travel sites to powerhouse car manufacturers needs to optimize their SOCs, retain talent, and expand business opportunities securely.

What's new in Calico Enterprise 3.14: WAF, Calico CNI on AKS, and support for RKE2

At Tigera, we strive to innovate at every opportunity thrown at us and deliver what you need! We have listened to what users ask and today we are excited to announce the early preview of Calico Enterprise 3.14. From new capabilities to product supportability and extending partnerships with our trusted partners, let’s take a look at some of the new features in this release.

For the Common Good: How to Compromise a Printer in Three Simple Steps

In August 2021, ZDI announced Pwn2Own Austin 2021, a security contest focusing on phones, printers, NAS devices and smart speakers, among other things. The Pwn2Own contest encourages security researchers to demonstrate remote zero-day exploits against a list of specified devices. If successful, the researchers are rewarded with a cash prize, and the leveraged vulnerabilities are responsibly disclosed to the respective vendors so they can improve the security of their products.

Is VPN or Zero Trust Access Best for Remote Working Security?

The pandemic changed the way people work, and many companies have been fast to adapt to this shift in work culture by encouraging and promoting remote and hybrid work. Zero Trust Network Access or ZTNA is gaining popularity as a secure alternative to corporate VPN-based access to the internal application and network services.

Three Lessons from the Confluence Server Vulnerability (CVE-2022-26134)

Recently, Atlassian issued a major security notice to all of its users about a critical vulnerability, identified as CVE-2022-26134, in its widely-used Confluence Server solution. The vulnerability would allow an unauthenticated malicious actor to execute arbitrary code on a Confluence Server or Data Center instance that could grant an attacker full command of the vulnerable server.

Viking Yachts Protects Intellectual Property From a Departing Employee (Case Study) | CurrentWare

“CurrentWare saved us a lot of time and money; when the employee was questioned about the data transfer they folded. I cannot thank all of you enough for this software. Being able to audit removable drives is invaluable.” A lot has changed in the world since our first case study interview in 2021 with Vincent (Vinny) Pecoreno, the Network Administrator for Viking Yachts.