Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The State of Infrastructure as Code Security at Kubecon Europe

The adoption of infrastructure-as-code and configuration-as-code is soaring with the rising popularity of technologies like Kubernetes and Terraform. This means that designing and deploying infrastructure is a developer task, even if your “developer” is an infrastructure architect, and, just like application code, configurations can use test-driven methodologies to automate security prior to deployment.

OWASP Top 10: Using Components with Known Vulnerabilities Security Vulnerability Practical Overview

If you know about a vulnerability, you can be certain that adversaries also know about it – and are working to exploit it. It sounds like a no-brainer; but using components with known vulnerabilities still makes #9 in the current OWASP list of the ten most critical web application security risks.

1Password Secrets Automation

Announcing 1Password Secrets Automation. It’s the 1Password you know and love, now for all your company secrets. 1Password protects secrets like logins and credit cards. Secrets Automation protects secrets in your company infrastructure – like API tokens, application keys, and private certificates – and supplies them when and where they’re needed.

OWASP Top 10 in 2021: Vulnerable and Outdated Components Practical Overview

If you know about a vulnerability, you can be certain that adversaries also know about it – and are working to exploit it. It sounds like a no-brainer; but using components with known vulnerabilities still makes #6 in the current OWASP list of the ten most critical web application security risks.

Arctic Wolf Managed Detection and Response

The cybersecurity landscape constantly becomes more difficult to defend as devices proliferate and cyberthreats become more sophisticated. Organizations often rely on new tools to stay protected, but this approach can quickly spiral into a maze of complex products—a patchwork of controls that lack the holistic integrity for effective cybersecurity. Your search for the right solution shouldn't be this hard.

The Rise of the PS5 Scalper Bots: An Analysis

Table of Contents In a webinar last December, Netacea’s Head of Threat Research, Matthew Gracey-McMinn, and Head of eCommerce, Tom Platt, joined forces to deep dive into the scale of the scalper bot problem, and the impact on the 2020 PS5 launch. If you missed the webinar, we’ve summarized the top takeaways for you here.