Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

FYI: the dark side of ChatGPT is in your software supply chain

Let’s face it, the tech world is a whirlwind of constant evolution. AI is no longer just a fancy add-on; it’s shaking things up and becoming part and parcel of various industries, not least software development. One such tech marvel that’s stealthily carving out a significant role in our software supply chain is OpenAI’s impressive language model – ChatGPT.

What Can be Learned from the JumpCloud Security Incident

In an ideal world, security incidents result in minimal damage, and we can learn from them to improve our future defenses. Fortunately, such appears to be the case with JumpCloud. According to JumpCloud’s blog post, its recent security incident impacted fewer than 5 JumpCloud customers and fewer than 10 devices. Moreover, working together with their incident response (IR) partner Crowdstrike (also a Salt Security partner), JumpCloud has mitigated the attack vector used by the threat actor.

Control your role! Kubernetes RBAC explored

Role-based access control (RBAC) is an approach for controlling which actions and resources in a system are available to different users. Users are assigned roles that grant them permission to use particular system features. Kubernetes has a robust built-in RBAC implementation for authorizing user interactions with your cluster. Setting up RBAC allows you to define the specific actions that users can perform on each Kubernetes object type.

BreachWatch vs LifeLock: Comparing Dark Web Monitoring Tools

The main differences between BreachWatch® and LifeLock are the type of protection they offer, the cost of each solution and the features they have. Continue reading to learn how BreachWatch and LifeLock compare, and how to choose the right dark web monitoring solution for yourself.

What your peers want to know before buying a DLP tool

Preventing data loss is a concern for almost every organization, regardless of size, especially organizations with sensitive data. Organizations, now more than ever before, rely on voluminous amounts of data to conduct business. When data leakage or a breach occurs, the organization is forced to deal with the negative consequences, such as the high cost associated with data breach fines and remediation and reputational harm to their company and brand.

How To Attract Top Cyber Talent

The past 18 months have shown that cybersecurity is an essential part of a successful and resilient business model, regardless of whether an organization has 50 or 5,000 employees. With half of all organizations surveyed in the 2023 Arctic Wolf “State of Cybersecurity” Trends Report noting they experienced a breach within the last year, it’s clear that cyber attacks and data breaches continue to keep security professionals up at night.

Egnyte Celebrates Fifteen Years

Time flies when you’re building an industry-leading platform for secure content collaboration spread worldwide! July officially marks fifteen years since we filed our articles of incorporation in 2008. The co-founders of Egnyte (Vineet Jain, Rajesh Ram, Amrit Jassal, and Kris Lahiri) were actively involved in the festivities and helped to make this milestone even more memorable for employees across the globe.

Shift Left is Only Part of Secure Software Delivery in Financial Services

The way we manage our money has changed dramatically. In little more than a decade, we’ve gone from branch-led services to feature-rich apps offering 24/7 access to our money. Open Banking is driving product innovation, fintechs are setting a new benchmark for customer-centric experiences, and AI is taking personalization to a new level. Financial services have never been so accessible and convenient.

Attack Surface Management: Challenges, Myths, and Solutions

In the modern era of interconnectedness and digitalization, the risk of cyber threats has increased in complexity and persistence. Organizations must adopt a proactive and strategic approach to security to safeguard their assets and minimize the likelihood of cyberattacks. One essential strategy in this regard is attack surface management. It enables businesses to identify and address potential vulnerabilities and exposures comprehensively.