Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Alert: peacenotwar module sabotages npm developers in the node-ipc package to protest the invasion of Ukraine

On March 15, 2022, users of the popular Vue.js frontend JavaScript framework started experiencing what can only be described as a supply chain attack impacting the npm ecosystem. This was the result of the nested dependencies node-ipc and peacenotwar being sabotaged as an act of protest by the maintainer of the node-ipc package.

3 Reasons Why JavaScript Security Is Important When Using Third-Party Code in Web Frameworks

Modern web frameworks can simplify the web application development process dramatically, facilitating innovation and saving time. However, their use can come at a steep price if the framework contains vulnerable or malicious third-party code. JavaScript security can help protect against the dangers of third-party code making it key for use in web frameworks.

Microsoft 365 and Teams Secure File Sharing Tips

Microsoft 365 provides a powerful document management and collaboration platform. However, with so many applications available in the platform to store and share information internally and with external parties, such as partners, contractors and vendors, ensuring proper access and data security can be a challenge. In this blog we examine how to ensure secure file sharing in Microsoft 365 and Teams.

#BigPictureCyber Town Hall With Glenn Gerstell, Senior Adviser to CSIS | 3/16/22 | NeoSystems

NeoSystems #BigPictureCyber Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly #BigPictureCyber Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, cybersecurity news, how to prepare for CMMC certification, and the latest updates from the CMMC AB.

Tigera: Hands-on workshop: Implementing Security and Observability for Containers

Attend this in-depth, hands-on workshop with a Calico expert to design and implement container security, zero-trust workload security, and advanced troubleshooting for your containerized workloads. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and is designed to provide more complete knowledge on: We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Tigera: Zero-Trust Workload Security Best Practices for Cloud-Native Applications

When the White House issues an executive order that the government and private organizations must implement Zero-Trust, it must be important. We agree. However, implementing Zero-Trust Security for Cloud-Native Applications can be challenging due to the larger attack surface, unsecured east-west traffic between workloads, and individual workloads accessing resources outside the cluster. In this webinar, you will learn how to apply the principles of Zero-Trust to secure cloud-native workloads. We will cover how Calico provides