Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Secure Software Updates Can Prevent Cyber Attacks on Connected Devices

Regularly updating the software on your connected devices is essential to keep them secure from cyber-attacks. To maintain security, it is crucial to install software updates that often contain important security patches that fix vulnerabilities that hackers could exploit. Without these updates, your devices could be at risk of being hacked. Keeping software up to date is vital for cybersecurity and performance, ensuring your devices are protected against vulnerabilities and run efficiently.

Navigating the Ethical Road: Recommendations for Connected and Automated Vehicles

Paul Lockley – VP Sales, EMEA In the ever-evolving landscape of transportation, the emergence of Connected and Automated Vehicles (CAVs) presents a promising shift towards safer, greener, and more accessible mobility solutions. However, as we embark on this transformative journey, it’s imperative to address the ethical considerations inherent in the development and deployment of CAVs.

Explore our guide to AWS S3 Bucket Penetration Testing

Amazon S3 buckets have become a cornerstone of cloud storage for businesses worldwide. AWS services, including S3, are integral to cloud storage and security. Their scalability and cost-effectiveness make them attractive, but this popularity comes with heightened security risks.

How Rubrik Supports Least Privileged Access in Microsoft Azure Cloud

The digital landscape is wild--and getting wilder. Research from Rubrik Zero Labs shows that cyber attacks are on the rise, with 94% of organizations reporting a significant attack in the last year. And the attacks are effectively disrupting business, with 62% of those reporting an attack revealing that their systems were compromised. So security teams need to use all of the tools in their toolkits to protect the enterprise.

Device Trust Policy | JumpCloud University Tutorial (2024)

In this tutorial, we'll go over how to use conditional access policies to enforce device trust for your fleet of devices. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content. For more information, check out our Help Center article(s).

Quantifying the Probability of Flaws in Open Source

Jay Jacobs and I recently delivered an RSA presentation called Quantifying the Probability of Flaws in Open Source. Since many people didn’t get a chance to see it, I thought I’d summarize some of the findings here for posterity. The question we investigated was simple, at least conceptually: what are the red flags of an open-source repository? Are there characteristics of a given open source library that would reliably indicate it was safer than others?

Securing AI-Enhanced Applications: Zenity's Role in Low-Code/No-Code Development

The rapid rise of low-code and no-code platforms has democratized application development, enabling even non-technical business users to swiftly create critical business applications. However, this accessibility brings new security challenges, particularly with the integration of AI technologies such as copilots, which are used to automate tasks and enhance functionality within these platforms. Zenity enhances the security of these AI-integrated environments by managing and securing AI copilots.

Polyfill.io Supply Chain Attack: Malicious JavaScript Injection Puts Over 100k Websites At Risk

Polyfill.io helps web developers achieve cross-browser compatibility by automatically managing necessary polyfills. By adding a script tag to their HTML, developers can ensure that features like JavaScript functions, HTML5 elements, and various APIs work across different browsers. Originally developed by Andrew Betts, Polyfill.io injects JavaScript polyfill libraries based on the user agent or other characteristics, streamlining code maintenance.

Secure API Management for LLM-Based Services

API Management is a comprehensive process that involves creating, publishing, documenting, and overseeing application programming interfaces (APIs) in a secure, scalable environment. APIs are the backbone of modern software architecture, enabling interoperability and seamless functionality across diverse applications. They facilitate the integration of different software components, allowing them to intercommunicate and share data efficiently.