Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Rising CVEs and the need for speed: Enhancing software security with JFrog Xray and PagerDuty

With the proliferation of CVEs (Common Vulnerabilities and Exposures), we have witnessed a remarkable surge in associated risks over the past five years. 2022 was a record-breaking year with 25,096 new CVEs found, the most discovered CVEs ever. Unfortunately, 2023 is on track to beat that record.

Top Open Source Licenses Explained

An open source license is a binding legal contract between author and user that declares the certain conditions in which a piece of software can be used, which is especially relevant in commercial applications. This license is what turns software components into open source components, allowing developers to use that software so long as they keep the specific terms and conditions laid out in the license. There are a lot of open source licenses, over 200 in fact.

Cronos Group chooses Aikido Security to strengthen security posture for its companies and customers

An IT match made in… Belgium! Aikido Security, a SaaS startup from Ghent, will provide application security to The Cronos Group, an e-business integrator headquartered in Kontich, with over 5,000 clients across their 570+ companies in the Benelux region. This strategic partnership is set to fortify The Cronos Group’s security posture and Aikido Security’s influence in the cybersecurity industry.

OWASP Clickjacking: The Enhanced Cheat Sheet [XLS DOWNLOAD]

Clickjacking is a widely used cyberattack technique where users are tricked into clicking on something without realizing it’s harmful. Clickjacking attacks can lead to serious problems like data theft and financial fraud, damaging organizations’ reputations. According to the Javelin 2022 Identity Fraud Study, 22% of U.S. adults have been victims of account takeover attacks. But here’s the good part.

Coffee Talk with SURGe: 2023-NOV-28 NCSC 2023 Review, ENISA Report, Netherlands Cyber Assessment

Grab a cup of coffee and join Ryan Kovar, Kirsty Paine, and Floris Ladan for a special EMEA edition of Coffee Talk with SURGe. The team from Splunk will compare highlights and similarities across recent cyber threat reports, including: Ryan and Floris also competed in a 60 second charity challenge to explain the importance of red teaming.

Mastering The DevOps Toolchain: 10 Essential to Build a DevOps Assembly Line

DevOps is more than just a buzzword and the dev behind the magic is more than just a tech wizard who orchestrates software delivery single-handedly. Behind the curtains is an assembly line of toolchains that makes DevOps possible. 44% of DevOps teams use between 2-5 tools, with 41% using 6-10 tools. High-performing teams also tend to use more tools, resulting in faster deployment cycles and delivering multiple times a month.

Velero Backup Essentials: Choosing What Works Best for You

Velero supports multiple types of backups including backups of resource specs, PV snapshots, backups of live PV data, and backups of PV snapshots. In this webinar, we will explain each of these methods in more detail and describe when each is appropriate and why you should pick one over another. The topic of which backup method to use elicits a lot of questions in the Velero forums and among our own user base, and we intend for this webinar to help clarify the matter.