Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Maturing Your Security Hygiene

Security hygiene is the process of reviewing your current cybersecurity posture and implementing security controls that mitigate data breach risks. As you mature your security hygiene, you create a centralized log management strategy that defines a path to a more robust posture. As part of this, you need to accommodate for the way threats evolve, including those unique to your specific industry or business.

Cybersecurity startup founders roundtable

We are pulling together several cybersecurity founders to talk about their companies, their experiences, lessons they have learned, and things they wished they knew. All of this with the intent of imparting some knowledge and inspiring those that may be sitting on the sidelines. Innovation is the lifeblood of cybersecurity and we want to do everything we can to get more people in the game.

Secure JavaScript URL validation

When developers need to handle URLs in different forms for different purposes — such as browser history navigation, anchored targets, query parameters, and so on — we often turn to Java. However, its frequent use motivates attackers to exploit its vulnerabilities. This risk of exploitation is why we must implement URL validation in our JavaScript applications.

How Azalea Health Ensures Customer Trust with Cloud-based Software Security

As head of the product department at Azalea Health, I need to understand what our market needs. Based on the conversations that we've had with hospitals and clinics, enterprise-grade security is something they desperately need but rightfully expect their EHR system to provide. That’s why it’s important for our organization to take the responsibility of securing health data off their shoulders.

Hey! Did you hear that (Insert: Your Company Name and Product) got hacked?

Have you noticed it’s never “Hey, someone got by a firewall” or “WOW, they bypassed the network security”? No. It’s always about the Device. It’s the same for hackers because everything else is just a means to an end, and that end is your Device! Imagine, late at night, driving around the Amusement Park security gate, then busting open the locked gated fence. These actions are necessary to get to the big score, the Rides! Yaaahoo!

Implementing TLS/SSL in Python

Nowadays, we do virtually everything online: book flights, pay for goods, transfer bank funds, message friends, store documents, and so on. Many things we do require giving out sensitive information like our credit card details and banking information. If a website uses an unsecured network, a malicious hacker can easily steal user information. This is why encryption is so important.

Understanding Sensitive Data Discovery: Classification and Tools

In its 2022 Cost of a Data Breach report, IBM notes that for 83% of companies, it’s not if a data breach will happen — but when. The sheer volume of data, as well as the difficulty in monitoring shadow IT and the shift to remote work, means that IT security teams face a persistent and ever-changing risk landscape that makes it extremely difficult to keep information secure. Protecting sensitive data starts with data discovery.