Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

How Atlassian used Snyk to solve Log4Shell

Snyk recently launched a multi-day live hack series with AWS, where experts demonstrated exploits in real-time and explained how to defend against those vulnerabilities. This series helped viewers discover new ways to improve security across the application stack for AWS workloads. As part of the series, Micah Silverman (Director of Developer Relations, Snyk) and Chris Walz (Senior Security Engineer, Atlassian) discussed Log4Shell.

Payette Fends off Cyber Breach with Rubrik Security Cloud

Payette, the award-winning architecture firm behind iconic buildings of Harvard University, Boston Children's Hospital, MIT, and more, successfully fended off a potentially crippling ransomware attack. With Rubrik Security Cloud, the hacker never even had the opportunity to deliver a ransom note and the firm had critical systems back online in less than 24 hours.

Best practices for Kubernetes Secrets management

Kubernetes uses secret objects, called Secrets, to store OAuth tokens, secure shell (SSH) keys, passwords, and other secret data. Kubernetes Secrets allow us to keep confidential data separate from our application code by creating it separately from pods. This segregation, along with well-formed role-based access control (RBAC) configuration, reduces the chances of the Secret being exposed — and potentially exploited — when interacting with pods, thereby increasing security.

Extend endpoint visibility with Google Chrome and Splunk security

Ever wondered how to find bad actors using only browser data? Attend this session to get a deeper understanding of the integration between Google Chrome and Splunk. See how to ingest data, and use it for threat hunting and adversarial identification. Speaker: James Young - Staff Security Strategist.

CRN Names WatchGuard to the 2022 Edge Computing 100 list

WatchGuard has been recognized by CRN in the 2022 Edge Computing 100 list in the Security category. This prestigious list highlights leading technology innovators that supply channel partners with next-generation edge technologies that allow businesses to capture, process, and use data in more intelligent ways. The categories recognized in this list include Edge Hardware, Software and Services; IoT and 5G Edge Services; and Security.

How to Deploy the Kubernetes Dashboard

Kubernetes clusters consist of multiple resources and API objects interacting dynamically—which typically makes cluster management via the CLI overwhelming. Kubernetes Dashboard was built to simplify cluster operations by providing a unified, human-friendly interface. The web-based dashboard enables cluster operators to deploy applications, access running workloads, and correlate logs with cluster events. This article demonstrates how to install and use Kubernetes Dashboard.

How Patching Thwarts Cyber Attackers

At SecurityScorecard, we analyzed open vulnerabilities across the entire Internet. Here are some of our shocking discoveries: Furthermore, on average, it takes these organizations a year to fix 50% of the vulnerabilities. That's why hackers often have the upper hand. Solution? Build a mature program that: Got questions? Let me know in the comments below. SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.

SAST - All About Static Application Security Testing

Static Application Security Testing (SAST) has been a central part of application security efforts for more than 15 years. Forrester’s State Of Application Security Report, 2022 found that lacking application security remains a leading cause of external security breaches, so it’s safe to say that SAST will be in use for the foreseeable future. Contents hide 1 What Is SAST? 2 Why do we need SAST? 3 What problems does SAST address? 4 How does SAST work?

Demo: Upgrading a Firebox

Because smaller companies are generally less protected and easier to break into, small business has become the new "big target" for cyberattacks. The Firebox M390 firewall is specifically engineered to defend all types of small businesses against attacks that are no less fierce than those targeting larger organizations. In this video, we show just how simple it is to upgrade your firewalls to the M390 with the optional Total Security Suite.