Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CloudFlow: Application Centric Risk Analysis And Remediation Using Tags

In addition to the ability to filter risks for cloud types, accounts and regions, you can now focus your risk analysis and remediation on specific categories of risks identified by tags (key/value combinations) applied to the cloud platform assets. Customers can leverage this capability to focus on analyzing and remediating risks related to specific applications.

What is Data Encryption and Why It's Recommended for Really Safe Online Security

Encryption has come a long, long way over the last few years. Something once reserved only for militaries and governments, encryption has been made super accessible and has become standard practice in the tech industry. Whether it’s texts, photos, or word docs - it can, and should, be encrypted. Put simply, encryption scrambles any file sent or stored online into unreadable nonsense that can only be translated (or decrypted) by a user with a key.

Security updates to cover your entire attack surface

Detectify’s Surface Monitoring is the easiest way to monitor and manage your attack surface on the market. This product continuously monitors the configuration and attack surface of your domains and subdomains. It came from the realization that Application Scanning, our other product, is very detailed. Application scanning tries to find every nook and cranny of your application through crawling and fuzzing which is exactly what companies need for custom-built applications.

Privacy and the death of security, what security teams need to know

As people start coming back to the office after working from home exclusively for two years, a hybrid work model will pose a series of challenges for security teams. One of these challenges involves reminding and reeducating workers about security best practices after two years of working remotely and using decentralized services.

The Security Community Needs to Take a Long, Hard Look in the Mirror

The security community took a step backward last week in our ability to deal with the crisis involving Okta. Instead of exercising well-thought-out and practiced contingency plans to objectively assess risk, many individuals took a trolling posture on social media. The reaction was neither professional nor conducive to our mission as defenders against threat actors seeking to do us harm.

Real-World Innovation: Why "Business IT" Should Replace "Shadow IT"

I recently had the pleasure of appearing on the Davood for Thought podcast. The host, Davood Ghods, is Vice President of Government Solutions at Direct Technology, so it was both enlightening and enjoyable to share insights with him. We discussed how we as an industry need to pursue innovation to solve real-world problems, as opposed to pursuing innovation for the sake of innovation.

How CloudCasa Helps Organizations Address Data Protection Weaknesses in Kubernetes

In a recent episode of TFiR Let’s Talk, Swapnil Bhartiya sat down with Sathya Sankaran, Chief Operating Officer at CloudCasa by Catalogic, to discuss how the Kubernetes ecosystem is shifting and how CloudCasa is helping organizations address the data protection weaknesses in Kubernetes and cloud-native infrastructure and adopt these new technologies.