Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malvertising: The enemy of shoppers everywhere

You’ve seen suspicious ads. Some were obvious — ads that claim your browser is infected with malware and you need to click immediately to remedy the situation — but likely, some weren’t obvious at all. They just looked like regular ads, and might have appeared on a site you trust. You didn’t know it (and hopefully didn’t click) but some of the ads you see regularly are malvertising.

Fixing the Log4j Vulnerability with WhiteSource

The announcement of Log4j vulnerability cve-2021-44228 sent security and development teams into a tailspin and highlights the one of biggest challenges of open source security: dependency management. The open source libraries that make up up to 80% of our applications are often a tangled web of dependencies.

How To: Mitigate Log4j Vulnerabilities with the Forescout Platform

Learn how to detect vulnerable managed assets with eyeSight and potentially exploited endpoints with eyeInspect. To download the latest Security Policy Templates, login to the Customer Support Portal. For the latest IOC / Industrial Threat Library - Please log into the Forescout OT/ICS portal.

Sensitive Data: What is it, and why you should never share it.

What is sensitive data? Sensitive data can be any type of information that you may not want to share. The scope of what falls into this category is vast, but includes things like your name, address, phone number and social security number. Watch this video for more on the different types of sensitive data and why you should never share it!

MFA everything!

This session will discuss what MFA is, why it is critical to use it for all access, and strategies for implementing MFA across an organization. This presentation will also include a brief demo showing how open source software can be used to help enforce MFA when accessing servers, databases, web applications, and Kubernetes clusters. Speaker: Jonathon Canada.

Cybersecurity: When Stress and Trauma 'Get in the Way'

This blog contains a discussion about stress, trauma, and domestic violence. This may be difficult for some readers, and given the alarming figures around Post-Traumatic Stress Disorder (PTSD), trauma, and early life experiences (ACEs), this will likely concern at least a small population of readers. Please take care of yourself when reading this and break off from reading if you feel the need to.

The Essential Guide to Slack Data Loss Prevention (DLP)

DLP ensures confidential or sensitive information (like credit card numbers, PII, and API keys) isn’t shared outside of Slack by scanning for content within messages and files that break predefined policies. DLP is important for both security and compliance reasons. With DLP in place, you’ll be able to.

What are the Types of Cyber Security Vulnerabilities?

As the threat landscape changes and advances with time, being able to address the most common types of cyber security vulnerabilities has gained the utmost importance. In this article, we will consider various types of cyber security vulnerabilities and how you can mitigate them. As information becomes an organization’s most important asset, cyber security gains increasingly more priority.