Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Log Jammin'- Detecting Log4j 2 RCE Using Splunk

Authors and Contributors: As always, security at Splunk is a family business. Credit to authors and collaborators: Ryan Kovar, Shannon Davis, Marcus LaFerrera, John Stoner, James Brodsky, Dave Herrald, Audra Streetman, Johan Bjerke, Drew Church, Mick Baccio, Lily Lee, Tamara Chacon, Ryan Becwar. If you want just to see how to find detections for the Log4j 2 RCE, skip down to the “detections” sections.

The Year in Review with the Team at LimaCharlie

Join the fast-growing team at LimaCharlie for an interactive living room style discussion about all that has happened in the last year. Meet key members of the team, learn about new features, the thinking behind them and get a glimpse of what is coming. During the discussion we will touch on the wide variety of capabilities enabled by the platform and how they can change the way that you view cybersecurity tools and infrastructure.

Continuous REST API Testing With CI Fuzz

CI Fuzz is a platform for automated security testing that aims to enable developers to ship secure software fast. The platform empowers development teams to automatically deploy continuous REST API security tests with each pull request. Since it enables the instrumentation of entire web service environments, CI Fuzz can create test inputs that are guided by code coverage. This enables it to uncover complex vulnerabilities and edge cases that other tools often overlook.

Developing a risk-based approach to cybersecurity in the hybrid workforce model

The hybrid workforce model is a novel workplace trend that provides employees the freedom to work from their homes while occasionally reporting to their offices. At the onset of the COVID-19 pandemic, organizations all over the world were forced to adopt remote working, or work-from-home, as the new norm. However, as organizations are gradually beginning to accommodate employees in their office spaces, a blended workplace model has become indispensable.

How to Make Your Vulnerability Management Metrics Count

Software development organizations are investing more and more resources in their vulnerability management programs. According to Gartner’s forecast, in 2021 enterprise security spending was expected to break records and grow 12.4% to reach 150.4 billion. But how do organizations know if they’re spending their security resources wisely? The answer can only be found by crunching the numbers.

Responsible disclosure: CodeCov CEO & CTO share learnings from the breach

In January of 2021, CodeCov suffered a supply chain attack that exposed client environment variables. In the following months, the specifics of the breach and its technical applications have been thoroughly examined by the application security community to determine what went wrong and how to combat similar attacks in the future. But another interesting outcome of the breach were the insights into a slightly less glamorous topic: responsible disclosure.

How to Scale Developer Security Using Snyk (Demo)

Emerging cloud-native technologies have shifted and expanded the scope of AppSec as we know it. Digital transformation and scale now hinges on developers’ ability to build and deploy rapidly – and doing so securely. Snyk’s developer security platform is designed to work like a developer tool – making it not only easy to find issues but to fix them quickly. In this recorded webinar, Jim Armstrong walks through a demo to show how developers can secure their proprietary code, open source libraries, container images, and infrastructure as code deployments.

How a Generalized Validation Testing Approach Improves Efficiency, Boosts Outcomes and Streamlines Debugging

In two recent blog posts from the CrowdStrike Software Development Engineers in Test (SDET) team, we explored how end-to-end validation testing and modular testing design could increase the speed and accuracy of the testing lifecycle. In this latest post, we conclude our SDET series with a deep dive on how our generalized validation testing component improves efficiency, enhances product functionality and streamlines troubleshooting.

How Are Bots Skewing Marketing Analytics? | Bot Management Review

Click fraud is gaining prominence as a threat to marketing budgets, however many businesses are less aware of the financial impact of skewed analytics caused by such activity. If bots and real customers look just the same, what does that mean for analytics? Are marketers making good decisions, or are they basing their marketing strategies on flawed data?