Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Tigera: Microsoft Azure: Hands-on AKS workshop: Kubernetes configuration security and compliance

In this AKS-focused security workshop, you will work with Microsoft Azure and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks, including but not limited to PCI, SOC 2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment.

Multivariate Anomaly Detection: Safeguarding Organizations from Internal Threats

‍ The term “internal threat” refers to the risk that somebody from inside a company could exploit a system to cause damage or steal data. Internal threats are particularly troubling, as employees may abuse extended privileges, leading to massive losses for the organization. One such infamous case is of an ex-Google employee who was charged with theft of trade secrets from Google for a ride-hailing start-up Uber.

Corelight Investigator introduces new Machine Learning Models

Corelight Investigator furthers its commitment to delivering next-level analytics through the expansion of its machine learning models. Security teams are now enabled with additional supervised and deep learning models, including: We continue to provide complete transparency behind our evidence -- showing the logic behind our machine learning models and detections, allowing analysts to quickly and easily validate the alerts.

Ultimate Guide to OWASP API Top 10

The OWASP API Top 10 is a list of common vulnerabilities found in APIs. OWASP created it as a resource for developers, testers, and security professionals to help them understand how to protect against API threats. Many people think that APIs are just another type of web application, but they're not; they have their own set of risks and challenges that need to be addressed. A simple API call can result in a data breach that could have lasting consequences for your business.

Introducing the LimaCharlie Query Language (LCSQL) BETA

This is an early introduction to the LimaCharlie Query Language (LCQL): a SQL-like language designed to allow users to quick and easily leverage historical telemetry and search across their entire fleet. It is an exciting new capability that enables a whole new class of use cases.

Stories from the SOC - RapperBot, Mirai Botnet - C2, CDIR Drop over SSH

Since mid-June 2022, AT&T Managed Extended Detection and Response (MXDR) Security Operations Center (SOC) observed an enormous number of attacks from Mirai botnet-C2 attempting to gain access to SSH servers instead of Telnet.Due to the various tactics, techniques, and procedures (TTP) observed, this attack has been associated with RapperBot botnet (Mirai variants.) RapperBot’s goal is still undefined.

The benefits of outsourced Data Protection Officer as a Service

As the world becomes increasingly digital and cloud based, the importance of data protection and privacy has become paramount for all organizations. One key aspect of ensuring compliance with data protection laws and regulations is the appointment of a Data Protection Officer (DPO). However, appointing a DPO internally can present several challenges, including conflicts of interest and a lack of specialized skills. That is where Data Protection Officer as a Service (DPOaaS) comes in.

AI Identity Verification: Top changes in Digital Verification & Onboarding

Identity verification is a critical aspect of many businesses and organizations, ensuring that the individuals accessing resources or services are who they claim to be. With the advent of Artificial Intelligence (AI), this process has become more efficient, secure, and cost-effective. In this blog, we will explore how AI is being used in identity verification and its potential benefits.