Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

CrowdStrike Cloud Infrastructure Entitlement Management (CIEM)

Identity theft and overly permissive accounts are major challenges faced by organizations in public and hybrid cloud environments. Learn how CrowdStrike Cloud Infrastructure Entitlement Management (CIEM) can increase the security of your cloud infrastructure while simplifying management across clouds.

The Future of Digital Forensics: Challenges & Opportunities

With the rise in cybercrime, including malware and ransomware attacks, digital forensics has become vital for many organizations. Digital forensics is the science of recovering, investigating, and analyzing digital records, often called digital artifacts, or in legal language forensic artifacts. This can be to find evidence of a crime, but is more often used to identify activity occurring on a computer and to understand how a cyberattack or breach may have occurred.

Take the Uncertainty Out of Ransomware Recovery: Introducing Rubrik Cyber Recovery

As the attack surface widens and cybercriminals get more sophisticated, organizations are struggling to prepare for and respond to ransomware and other cyber incidents. According to the inaugural State of Data Security report from Rubrik Zero Labs, a staggering 92% of global IT and security leaders are concerned they are unable to maintain business continuity following an attack.

Inside the Mind of a 'Rat' - Agent Tesla Detection and Analysis

Agent Tesla is a remote access trojan (RAT) written for the.NET framework that has knowingly been in operation since 2014. Threat actors behind this malware have leveraged many different methods to deliver their payload over time including macro enabled Word documents, Microsoft Office vulnerabilities, OLE objects and most recently, compiled HTML help files.

SecurityScorecard Enables Cyber Insurers to Shift from Static to Dynamic Loss Control

It’s no secret that loss control programs are essential for cyber insurance. Unlike other forms of insurance where the risk and assets don’t change much during a policy term, cyber insurance is meant to mitigate a constantly evolving risk and cover organizations whose security posture is always changing. A cyber insurance policy could be priced completely differently today compared to a few weeks or months later.

How Atlassian used Snyk to solve Log4Shell

Snyk recently launched a multi-day live hack series with AWS, where experts demonstrated exploits in real-time and explained how to defend against those vulnerabilities. This series helped viewers discover new ways to improve security across the application stack for AWS workloads. As part of the series, Micah Silverman (Director of Developer Relations, Snyk) and Chris Walz (Senior Security Engineer, Atlassian) discussed Log4Shell.

Payette Fends off Cyber Breach with Rubrik Security Cloud

Payette, the award-winning architecture firm behind iconic buildings of Harvard University, Boston Children's Hospital, MIT, and more, successfully fended off a potentially crippling ransomware attack. With Rubrik Security Cloud, the hacker never even had the opportunity to deliver a ransom note and the firm had critical systems back online in less than 24 hours.

Best practices for Kubernetes Secrets management

Kubernetes uses secret objects, called Secrets, to store OAuth tokens, secure shell (SSH) keys, passwords, and other secret data. Kubernetes Secrets allow us to keep confidential data separate from our application code by creating it separately from pods. This segregation, along with well-formed role-based access control (RBAC) configuration, reduces the chances of the Secret being exposed — and potentially exploited — when interacting with pods, thereby increasing security.