Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Log4j/Log4Shell One Year Later: Endemic Vulnerability Indeed

On December 9, 2021, Apache upended the cybersecurity industry by publishing a zero-day vulnerability (CVE-2021-44228) for its ubiquitous Log4j logging utility. Dubbed Log4Shell, the remote code execution flaw (CVSS score:10) allows an attacker to take control of a connected device and run malicious code, access sensitive data or alter its configuration. Because Logj4 is free and easy-to-use, it’s embedded (often deeply) in Java applications used by IT and OT platforms worldwide.

Defragging database security in a fragmented cloud world

Security can often be distilled down to protecting data. And with microservice-driven applications, the approach to cloud database security has evolved quite dramatically. Beyond just securing data in the cloud, it’s now also difficult to know where the data resides, where the data is flowing, and how this data should be classified.

Coffee Talk with SURGe: Splunk GovSummit, NIS2, Cyber Collaboration Program, Exercise Crossed Swords

Grab a cup of coffee and join Ryan Kovar, Mick Baccio, and Kirsty Paine for a special episode of Coffee Talk with SURGe, live in Washington, DC for GovSummit. The team from Splunk will discuss the latest security news, including: The episode also features a special GovSummit segment featuring Splunk CEO Gary Steele and Juliana Vida, Splunk's Chief Technical Advisor for the public sector.

This Month in Datadog: Cloud SIEM Investigator, API Catalog, Expanded AWS Coverage, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. This month, we put the Spotlight on Universal Service Monitoring..

Stranger Danger: Your JavaScript Attack Surface Just Got Bigger

Building JavaScript applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome - you're a cloud native application developer! As developers, our responsibility has broadened, and more software means more software security concerns for us to address.

The Secrets to a Successful Career in Cyber Security

In this video, I'm sharing with you the secrets to a successful career in cyber security. Cyber security is one of the fastest-growing sectors, and there are plenty of opportunities for skilled professionals. If you're interested in a career in cyber security, then you need to watch this video! I'll share with you everything you need to know to get started in this exciting field. From the basics of cyber security to what employers are looking for in a cyber security candidate, this video will help you build a successful career in cyber security.

Vanta is the #1 Leader in G2's Winter 2023 Grid Reports for Security Compliance

We are excited to share that Vanta has been named the #1 Leader in G2’s Winter 2023 Grid® Report for Security Compliance. We’ve also been recognized as the #1 Leader in G2’s Cloud Compliance category for the sixth consecutive season, and retained leadership in Vendor Management, Vendor Security and Privacy Assessment, Cloud Security, and IT Asset Management for multiple seasons. Vanta is the leader in a total of 19 G2 categories. ‍ ‍

Cloudflare Security Analytics, WAF Attack Score, and Uploaded Content Scanning

Cloudflare Security Analytics, WAF Attack Score, and Uploaded Content Scanning further enhance Cloudflare security and WAF capabilities. Security Analytics brings together all Cloudflare security detection capabilities in one place to show a detailed understanding of a site's traffic and threats. WAF Attack Score via machine learning scores every request with a probability of it being malicious. Uploaded Content Scanning scans content being uploaded to your application for malicious content.