Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Remote Development with Visual Studio Code and Teleport

In this video, we'll look at how to use Visual Studio Code's Remote SSH extension alongside of Teleport. This extension allows users to open any file or folder on a remote machine using SSH along with the ability to utilize VS Code's full feature set. Well use Teleport to generate an OpenSSH config, granting secure, short-lived access, to it's managed servers, via this extension.
Featured Post

Into the future: what might cybersecurity look like in 2023?

As we enter into 2023, cybersecurity must be at the forefront of our minds. With hackers becoming increasingly sophisticated in their techniques and the number of endpoints growing exponentially due to the explosion in the number of connected devices, it is critical that over the next 12 months we consolidate our efforts to stay one step ahead of the threats.

Understanding the U.S. State and Local Cybersecurity Grant Program

With over 90 thousand different state and local governments across the U.S., creating a unified approach to cybersecurity and defending all of these counties, cities, territories, states, and commonwealths is not only in each of their interests, but the national interest as well.

How can Cyber Security Playbooks and Runbooks Benefit Your Security Program?

You probably don’t need anyone to tell you that, today, infosec and cybersecurity are challenging and fast-paced endeavors. In the last five years alone, we’ve seen a myriad of industry altering developments — from an ever expanding universe of privacy compliance legislation and the permanent entrenchment of hybrid and remote work, to growth in the size and scope of data breaches — the world of security has proven ever complex and ever-shifting.

2022 End of Year Roundup

In recent times it has become clear to organizations that the handling of data is a very important matter, as the exposure or misuse of data are both a serious threat to an organization's financial standing and reputation, and must be accounted for in each organization's risk posture. In terms of high-profile data breaches, this year has been no different than previous years, seeing its fair share of ransomware attacks and data exposure.

What were the biggest cyberattacks in 2022?

Cyberattacks consistently hit the headlines throughout the year, and they aren’t expected to slow down any time soon. While the intensity and impact change from one attack to the other, there are always a few that rank the highest in terms of size. We looked at the five biggest cyberattacks of 2022 and how they influenced users around the globe.

FinTech & Banking: A Comprehensive Guide to Client Onboarding

The customer experience at the world’s biggest banks and fintech firms is undergoing a significant change. Because of technological advancements, account users may now not only transfer money online but also log in using Identity Verification using face match technology and do a variety of operations using simply their smartphone and its front camera. Technology in this area has made things faster, easier, and safer during the last decade.

CVE-2022-42475: Remote Code Execution vulnerability in Fortinet SSL VPN service

On the 12th of December 2022, Fortinet published an advisory regarding an actively exploited remote code execution vulnerability affecting FortiOS through the SSL VPN service. Fortinet has stated that they are aware of at least one instance where this vulnerability was successfully exploited in the wild, though other undocumented cases may exist. The threat actors leveraged the vulnerability to deploy malicious files on the filesystem of affected devices.

5 Ways to Reduce your Cloud Attack Surface

The emergence of cloud computing transformed the nature of IT ecosystems and infrastructure in many beneficial ways. From cost savings to flexibility to unparalleled scalability, the cloud’s advantages are well-documented. But it’s important not to overlook the fact that migrating to the cloud introduces many new points where unauthorized hackers can try to enter and launch a cyber-attack.

Secure serverless applications with Datadog ASM

The popularity of serverless architectures continues to grow as organizations seek ease of scalability and to eliminate the need to provision and manage infrastructure. In fact, in our most recent State of Serverless report, we found that more than half of our customers have adopted serverless technologies offered by Azure, Google Cloud, and AWS.