Top 10 Azure Cloud Configuration Mistakes

Top 10 Azure Cloud Configuration Mistakes

Top misconfigured rules for Azure services Let’s look at three top misconfigured services for Azure and the Conformity rule for that service with the highest misconfiguration rate. Service: Azure Activity LogRule(s): “Create alert for ‘delete PostgreSQL database’ events” and “create alert for ‘create/update PostgreSQL database’ events” The top misconfigured rules for Azure Activity Log are related to PostgreSQL, a fully managed database-as-a-service platform. “Create alert for ‘delete PostgreSQL database’ events” and “create alert for ‘create/update…

Read More

Virtual Patching 101

Virtual Patching 101

Virtual Patching 101 Network Security Get the lowdown on virtual patching: a simplified, automated solution to shielding vulnerabilities from exploits. By: Trend Micro December 07, 2021 Read time:  ( words) Ever heard the phrase “one and done?” This applies to vulnerabilities as well. Just one vulnerability can be targeted by threats and wreak havoc on your apps and organization. And while some vendors may release a patch, oftentimes you can’t just wait around for the…

Read More

A Complete Guide to Cloud-Native Application Security

A Complete Guide to Cloud-Native Application Security

However, these tools have downsides that may cause more challenges for DevOps teams: SAST has difficulties scanning and reporting on cloud-native applications because static tools only see the application source code it can follow. As more cloud-native apps are now developed with libraries and third-party components, this generates failures in the tool processing these links. DAST interactively testing the applications from the outside requires the application to be fully built upon every code change. As…

Read More

Application Security 101

Application Security 101

Application Security 101 Serverless Security Everything DevOps teams need to know about web application security risks and best practices. By: Trend Micro November 17, 2021 Read time:  ( words) Web applications are becoming increasingly complex and the speed of delivery more demanding. This strain of speed and scale is making application vulnerable to attackers. According to Verizon, the majority of breaches were caused by web application attacks. This means application security is more crucial than…

Read More
1 6 7 8