Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

CloudCasa: Get Kubernetes Ransomware Data Protection and Choice of Azure or AWS Storage for Backups with 5TBs Free

CloudCasa is a simple and unique Kubernetes and cloud database backup as a service for DevOps and IT Ops team to support data protection, disaster recovery, and compliance requirements for cloud native applications. Join this webinar to learn about CloudCasa and recent enhancements to the service.

Stories from the SOC - Office 365 account compromise and credential abuse

Credential abuse and compromised user accounts are serious concerns for any organization. Credential abuse is often used to access other critical assets within an organization, subsidiaries, or another partner corporation. Once an account is compromised, it can be used for data exfiltration, or to further promote the agenda of a threat actor.

Difference between Agent-based and Network-based Internal Vulnerability Scanning

Technology evolution is the only constant in our lives these days. Sometimes, an existing approach can go a long way in addressing problems, while other times, a new approach needs to be adopted to get the work done. Let’s talk about vulnerabilities; internal networks and software can be riddled with loopholes, which can expose them to breaches and data leaks, paving the way for hackers to have an easy ride.

Getting started with Snyk for secure Java development

If you’re a Java developer that wants to develop your applications more securely, you’ve come to the right place. Snyk can help you with that mission. This article will explain how to begin with Snyk for secure Java development so you can be more secure from the get-go. If you’re new to Snyk, it’s important to know that we offer a variety of developer-focused products and tools. Some of these tools, like our CLI and some IDE integration, support multiple products.

Security is Everyone's Job: 11 Questions You Should Be Asking

One of the most common misconceptions about cybersecurity is that the responsibility and ownership sits solely on the shoulders of the CISO and the security team. Common assumptions are anything related to cybersecurity, a security issue or security initiative resides with the security team and the Chief Information Security Officer (CISO). Phishing attacks? That’s a problem for the security department. Vetting vendors and third parties? That belongs to the vendor management team.

How does AWS IAM role, STS and Identity Pool work with each other.

We talked about IAM in the past 3 posts, identities in IAM, manage users privilege as an IT person and control privilege boundaries. We also talked about how applications use AWS Cognito Identity Pool to get AWS temporary credentials to access AWS resources in early posts of “What I wish I could have learned before starting using AWS Cognito” and “Authentication and authorization with AWS Amplify under the hood”.

Securing the Supply Chain

This webinar was hosted by Ignyte Assurance Platform and MAGNET: The Manufacturing Advocacy and Growth Network. How to protect your assets from cyber threats and attacks Guidance on the latest and necessary cybersecurity requirements and legislations Find out what your business needs to comply with and what it takes to get there in the shortest possible time Learn what’s the most efficient way to maximize your efforts and resources in cybersecurity

On the Importance of Protecting U.S. Pipeline Owners and Operators

In the beginning of May, a U.S. pipeline company suffered a ransomware attack. The company decided to respond by halting operations while it investigated the incident. This delayed tens of millions of gallons of fuel from reaching their destination all along the East Coast. Less than a week later, Bloomberg reported that the company had paid millions of dollars to a ransomware group in order to regain access to their systems. U.S.

Zero Trust Architecture (ZTA) within LEXIS

To ensure Outpost24 stays at the forefront of cybersecurity technology we conduct regular research into new innovations, and LEXIS High Performance Computing (HPC) is one of them. Outpost24 was instrumental in contributing and providing the “Security-By-Design” and “Zero-Trust” principles to creating the secure LEXIS Cloud-HPC-Big Data platform, and in this blog we explore the zero-trust fundamentals for which the LEXIS portal has been designed.

Portrait of Malicious Insiders: Types, Characteristics, and Indicators

While organizations are spending a good deal of money protecting their data against unauthorized access from the outside, malicious insiders may pose no less harm. According to the 2021 Data Breach Investigation Report [PDF] by Verizon, 36% of all data breaches experienced by large organizations in 2020 were caused by internal actors. For small and midsize businesses, it was 44%.