Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mend SCA Action within Amazon CodeCatalyst Brings Additional Application Security to Developers

Announced today at AWS re:Invent, Amazon CodeCatalyst brings together everything software development teams need to plan, code, build, test and deploy applications on AWS into a streamlined, integrated experience.

Whoops! Researchers accidentally crash botnet used to launch DDoS and cryptomining campaigns

Researchers investigating a newly-discovered botnet have admitted that they "accidentally" broke it. In November, security experts at Akamai described a Golang-based botnet that they had discovered, hijacking PCs via SSH and weak credentials in order to launch distributed denial-of-service (DDoS) attacks and mine cryptocurrency.

Evaluating Network Validation Solutions

Sometimes as a network engineer, you may feel like you're walking through a carnival where the barker shouts, "Step right up, ladies and gentlemen," promising something never seen before, only to find a poorly constructed paper mache replica of the impossible (or in our world, vaporware). Eventually, you become jaded and ignore the shouts until someone you trust tells you to take a look.

Point Clouds: Simplify transfer from Point A to Point B

‍ AEC project teams are using point cloud data to enhance their BIM projects. By importing point cloud data into their CAD software, they can get a more accurate representation of the buildings and landscapes they are working on. This can help with design, construction, and even marketing efforts.

CrowdStrike Falcon Platform Achieves 100% Detection and Protection Against MacOS Malware with Zero False Positives in Latest MacOS AV-TEST

As organizations increasingly face malware attacks that target macOS, detecting and preventing attacks without disruption caused by false positives and false warning messages is increasingly important. That’s why we’re proud to share that the CrowdStrike Falcon® platform once again achieved 100% detection and prevention of macOS malware with ZERO false positives in the latest AV-TEST macOS evaluation.

How to Extend Your Digital Transformation Efforts to Your GRC Program

Digital transformation is no longer a new concept – various business functions have already embraced cutting-edge technology to stay ahead of the curve. From IT, sales, and marketing to customer support and even finance, it is evident that most departments understand how integral the transformation is to gain a competitive advantage and continue to win customers. However, when it comes to Governance, Risk management, and Compliance (GRC), most are still stuck with archaic, ad-hoc processes.

Tanium Converge - Labs - Zombie Hunters

Tanium Tech Talks host Ashley McGlone spoke with attendees of Converge for highlights of the technical track: capture the flag (CTF), labs, and certifications. In this series you will get a feel for what it is like to attend in person and the many resources available during (and after) the event. Tanium Converge took place in Austin, Texas November 13-17, 2022.

Tanium Converge - Labs - Insider Threat

Tanium Tech Talks host Ashley McGlone spoke with attendees of Converge for highlights of the technical track: capture the flag (CTF), labs, and certifications. In this series you will get a feel for what it is like to attend in person and the many resources available during (and after) the event. Tanium Converge took place in Austin, Texas November 13-17, 2022.

Shift-Left Testing and Its Benefits

Testing practices have been shifting left in the software development process due to the growing challenge of developing and delivering high-quality, secure software at today’s competitive pace. Agile methodologies and the DevOps approach were created to address these needs. In this post, we’ll map out the basics of shift-left practices in the DevOps pipeline and discuss how to shift left your open source security and compliance testing. Contents hide 1 What does shift left mean?