Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Mitigate identity risks and infrastructure vulnerabilities with Datadog Cloud Security Management

Cloud environments comprise hundreds of thousands of individual components, from infrastructure-level containers and hosts to access-level user and cloud accounts. With this level of complexity, it’s important to establish and maintain end-to-end visibility into your environment for many reasons—not least among them to efficiently identify, prioritize, and mitigate security threats.

Understanding the California IoT Security Law (SB-327)

In September 2019, California signed Senate Bill 327, also known as the California Internet of Things (IoT) Security Law. While not an extensively written piece of legislation like the California Consumer Privacy Act (CCPA), SB-327 took effect on January 1, 2020, and focuses on manufacturers of connected devices—requiring updated security standards that protect both devices and end-users. Learn how UpGuard can help your organization update security standards and monitor risk >

Code Mirage: How cyber criminals harness AI-hallucinated code for malicious machinations

The landscape of cybercrime continues to evolve, and cybercriminals are constantly seeking new methods to compromise software projects and systems. In a disconcerting development, cybercriminals are now capitalizing on AI-generated unpublished package names also known as “AI-Hallucinated packages” to publish malicious packages under commonly hallucinated package names.

2023 Global Cloud Threat Report: Cloud Attacks are Lightning Fast

The second annual threat report from the Sysdig Threat Research Team (Sysdig TRT) is packed with their findings and analysis of some of the hottest and most important cybersecurity topics this year. Threat actors are really embracing the cloud and are using it to their advantage to evade detection and speed up their attacks.

How Torq Socrates is Designed to Hyperautomate 90% of Tier-1 Analysis With Generative AI

Artificial intelligence (AI) has generated significant hype in recent years, and separating the promise from reality can be challenging. However, at Torq, AI is not just a concept. It is a reality that is revolutionizing the SOC field, specifically in the area of Tier-1 security analysis, especially as cybercriminals become more sophisticated in their tactics and techniques. Traditional security tools continue to fall short in detecting and mitigating these attacks effectively, particularly at scale.

Find All Your APIs with API Discovery

APIs operating without any security controls are just waiting to be exploited. Misconfigurations, suspicious behavior, and cyber attacks may already be occurring without your knowledge. Hackers are on the lookout for APIs that will allow them to access data covertly, providing time to not only extract data, but to explore additional attack vectors.

Effective Access and Collaboration on Large Lab Datasets using Egnyte's Smart Cache

The life sciences industry is at the forefront of data-intensive research and innovation. Scientists and researchers rely heavily on the collection, processing, and analysis of vast amounts of data generated by lab instruments. And they are often challenged by errors or confusion in managing data flows that in turn, have a direct impact on the quality of data and corresponding compliance with regulatory requirements.

Using Asset Management to Keep a Cloud Environment Secure

In modern network environments focused on cloud technology, organizations have undergone a significant transformation in the development and deployment of their IT assets. The introduction of cloud technology has simplified and expedited the deployment process, but it often lacks centralized change management. The cloud's shared responsibility model enables quick deployment and scaling but can pose security risks if not properly managed and understood.

2 (Realistic) Ways to Leverage AI In Cybersecurity

If you had to choose a security measure that would make the most difference to your cyber program right now, what would it be? Maybe you’d like to get another person on your team? Someone who is a skilled analyst, happy to do routine work and incredibly reliable. Or perhaps you’d prefer an investment that would give your existing team members back more of their time without compromising your ability to find and fix threats? What about human intelligence without human limitations?