Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Gluu provides clients instant access to their Open-source platform using Teleport

With Teleport, Gluu can provide its clients with near-instantaneous access to its open-source software, allowing them to get up and running in minutes. This is a huge benefit for organizations who need to quickly provision their tools in order to start using them. In the past, Gluu has documented many ways that it uses Teleport to provide Gluu clients a gateway for their tools.

How to Protect Your Personal Data: Three Privacy Tips To Stay Ahead

Technology has advanced our world in countless ways. Every day we bank, shop, conduct business, and exchange photos and messages with family and friends online. While digital devices and services offer great convenience, they also pose risks to our data and privacy as our offline and online lives converge. In 2021, data breaches reached an all-time high of 1,862, according to the Identity Theft Resource Center (ITRC), a 68% increase over 2020.

The Top Cyber Attacks of September 2022

Maybe it’s the changing of the seasons, the start of a new school year, or just something in the air, but September’s cybersecurity landscape was marked with high-energy hacks that seem to have served as twisted amusements for their perpetrators. This month’s round-up is full of criminals who weren’t content just to collect a ransom or sell some private data. These hackers wanted to scorch the earth and hurt their victims with an extra layer of malice and humiliation.

RedLine Stealer Campaign Abusing Discord via PDF Links

RedLine is an infostealer malware discovered in 2020. Often sold in underground forums, it is capable of stealing data such as credit card numbers, passwords, VPN and FTP credentials, gaming accounts, and even data from crypto wallets. In May 2022, Netskope Threat Labs analyzed a RedLine stealer campaign that was using YouTube videos to spread, luring victims into downloading a fake bot to automatically buy Binance NFT Mystery Boxes.

Why Security Should be Design Principle Number One

National Cybersecurity Awareness Month (NCSAM), held every October, highlights a key theme each year. For 2022, the theme is: “See Yourself in Cyber.” Cybersecurity is more than a set of principles or tools—people are a major component, helping keep businesses safe by complying with multi-factor authentication, using strong passwords, keeping devices updated with the latest software, not installing unapproved software on devices, and reporting phishing.

Are You CODEfident?

We’ve been watching the global transition to an app-driven world for some time now, as companies develop and deploy innovative software at warp speed. And we’ve also watched application security teams struggle to keep up. Many try to use yesterday’s tools for today’s AppSec reality, while others wrestle with immature application security programs. And that’s when we realized: modern application security programs are different. They run on CODEfidence. Let me explain.

#DevOpsSpeakeasy at #swampUP San Diego 2022 with Eyal Ben Moshe

In this interview, we speak to Eyal Ben Moshe, Head of the Ecosystem Engineering Group at JFrog, about the importance of shifting left and providing tools for developers to keep their software secure. He specifically discusses the release of Frogbit and Docker Desktop Extension and teases the BuildInfo resource, the metadata associated with a build in Artifactory.

3 Services That Improve Your Security Posture

Besides KPIs and ratings to measure and quantify risk, you need to have a team of experts available 24/7, who you can rely on to help fix the worst problems. Put these four services in your cybersecurity toolbox: If a ransomware attack happens in the middle of the night on the weekend, you must be able to call somebody 365 days a year to help you recover and figure out how to get back up to speed. If you get breached, how do you diagnose how an attacker got in? You need to have experts who can go on your site and understand how attackers penetrated the defenses.