Virtual Machine vs Container

Virtual Machine vs Container

The difference between virtual machines and containers Virtual machines (VMs) and containers are as similar as they are different. They each have their own unique characteristics and use cases that separate them from each other. However, they are similar in that they can be used either together, or interchangeably, to enhance IT and DevOps efficiency. Great, all that sounds fine and dandy, but what are virtual machines and containers actually used for? I’m glad you…

Read More

New AWS Competency Category – Why It’s Important

New AWS Competency Category – Why It’s Important

What is AWS DevOps Competency Partners? AWS DevOps Competency Partners are vendors vetted and selected by AWS that “have demonstrated expertise in delivering DevOps solutions on AWS.” According to AWS, these solutions include: software products to simplify provisioning and managing infrastructure, deploying application code, automating software release processes, monitoring application and infrastructure performance, and integrating security best practices, policies, and guardrails into CI/CD pipelines. Why it matters to DevOps teams DevSecOps is the newest category,…

Read More

Here’s a Path to Better Attack Surface Risk Management

Here’s a Path to Better Attack Surface Risk Management

So, how can security leaders stay on top of their attack surface and ahead of the bad guys? By leveraging a unified cybersecurity platform that enables continuous security visibility and monitoring across the discovery, assessment, and mitigation phases of the attack surface risk lifecycle. Let’s dive deeper into how a platform can enhance attack surface risk management versus utilizing point products. Discover your digital attack surface First, you need total visibility to be able to…

Read More

Unified Cybersecurity Platform: Why CISOs are Shifting

Unified Cybersecurity Platform: Why CISOs are Shifting

Unified Cybersecurity Platform: Why CISOs are Shifting Risk Management Our global study polled more than 2,300 IT security decision makers to discover how to best assist and support SecOps teams with a unified cybersecurity platform so you can be more resilient with less resources. By: Trend Micro April 24, 2022 Read time:  ( words) As the number of threats continues to rapidly increase and the corporate attack surface expands due to the accelerated shift to…

Read More

Cybersecurity Predictions for 2022

Cybersecurity Predictions for 2022

Zero day and known vulnerabilities Increased media attention and big payouts will motivate cybercriminals to launch an unprecedented number of zero-day exploits, surpassing the record-setting number in 2021. However, security leaders still need to look out for older, known vulnerabilities. As we previously mentioned, old vulnerabilities are still traded and purchased in underground markets, as enterprises often struggle with complex patch management. In 2022, we’ll see malicious actors continuing to take advantage of the growing…

Read More

Cryptomining Overview for DevOps

Cryptomining Overview for DevOps

What is cryptomining? Malicious cryptomining or cryptocurrency-mining is when cybercriminals exploit unpatched vulnerabilities, weak credentials, or misconfigurations to enter systems and utilize its computer power to generate cryptocurrency. DevOps and cryptomining While ransomware seems to be the hot topic, cryptomining is still a cyberattack with dire consequences. Remember Apache Log4j (Log4Shell)—to be honest, who can forget? This critical vulnerability was mostly observed in the wild in cryptomining attacks. Think of the uptick in cryptomining like…

Read More

Cyber Risk Index (2H’ 2021): An Assessment for Security Leaders

Cyber Risk Index (2H’ 2021): An Assessment for Security Leaders

Let’s dig into the results a bit further to identify areas of greatest concern across regions. 1. Top five security risksWith the global Covid-19 pandemic continuing as well as many successful ransomware attacks and breaches occurring, it does appear that many organizations felt some areas of their preparedness may be more of a concern now than in the past. Below are the top five security risks around their infrastructure: Mobile/remote employees Cloud computing infrastructure and providers…

Read More

Cyber Risk Index (2H’ 2021): An Assessment for Security Leaders

Cyber Risk Index (2H’ 2021): An Assessment for Security Leaders

Let’s dig into the results a bit further to identify areas of greatest concern across regions. 1. Top five security risksWith the global Covid-19 pandemic continuing as well as many successful ransomware attacks and breaches occurring, it does appear that many organizations felt some areas of their preparedness may be more of a concern now than in the past. Below are the top five security risks around their infrastructure: Mobile/remote employees Cloud computing infrastructure and providers…

Read More

Why the Mitre Engenuity ATT&CK Evaluations Matter for CISOs

Why the Mitre Engenuity ATT&CK Evaluations Matter for CISOs

Why the Mitre Engenuity ATT&CK Evaluations Matter for CISOs This year’s MITRE Engenuity™ ATT&CK Evaluation simulates techniques associated with notorious threat groups Wizard Spider and Sandworm to test solutions’ ability to detect and stop APT and Targeted Attacks. By: Trend Micro April 08, 2022 Read time:  ( words) As the cyber attack surface continues to rapidly expand, enterprises need a security solution that can help organizations to better understand, communicate, and mitigate cyber risk across…

Read More

This Week in Security News – April 1, 2022

This Week in Security News – April 1, 2022

Read on:  Probing the Activities of Cloud-Based Cryptocurrency-Mining Groups Trend Micro‘s research into cloud-based cryptocurrency mining sheds light on the malicious actor groups involved in this space, their ongoing battle for cloud resources, and the actual extent of the impact of their attacks. Lapsus$ ‘Back from Vacation’ Lapsus$ added IT giant Globant plus 70GB of leaked data – including admin credentials for scads of customers’ DevOps platforms – to its hit list. The Lapsus$ data…

Read More
1 9 10 11 12 13 16