Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Getting Networking Right in the SASE Era

In 2019, when the term Secure Access Service Edge, or SASE, was first coined, it was to define a useful way of setting up the network and security infrastructure to satisfy a cloud-first future with services at the edge. Since then, SASE has been long on hype and discussion, but short on actual, practical advice. What does SASE mean for your digital transformation strategy?

Analysis of a Parental Control System

Canopy was advertised to me through my child’s school. The company offers a multi-platform parental control app claiming various abilities to limit and monitor use of protected devices. Access to Canopy is billed monthly and includes a compelling list of features for concerned parents: Several of these features imply that the app has privileged access to the protected device and may be intercepting TLS connections to filter content.

4 Types of MSPs that Can Help You Meet Your Cybersecurity Needs

In my previous post, I discussed some of the reasons why organizations decide to partner with managed service providers (MSPs). Organizations need to be careful when deciding to work with a specific provider, however, as not all MSPs are the created the same. Part of the reason why is because MSPs come in four varieties. Let’s discuss those types below.

Elastic Security: Building the future of Limitless XDR

At ElasticON Global 2021, the team behind Elastic Security shared how we’re building the future of Limitless XDR (Extended Detection & Response) by unifying the capabilities of SIEM, endpoint security, and cloud security. With Limitless XDR, practitioners can prevent, detect, and respond to the threats of today and tomorrow.

Q2 Trends: More Cybersecurity and More Cloud

The coronavirus pandemic has forced a transformation in working practices and with it, the way MSPs manage customer cybersecurity. The possible return to the physical workplace and lingering economic uncertainties pose new challenges for tech leaders. These behavioral changes are measured in this Pulse report, which analyzes IT priorities and budgets in this area for Q2 of 2021. What do IT leaders expect the coming months to look like in terms of IT spending and priorities in their departments?

Leveraging National Cybersecurity Awareness Month to Reduce Insider Threats

October is a month that generates much buzz amongst the cybersecurity community. It’s National Cybersecurity Awareness Month (NCSAM) – a time when security professionals work around the clock to raise awareness of growing cyber risks amongst general user communities.

23andMe's Yamale Python code injection, and properly sanitizing eval()

JFrog security research team (formerly Vdoo) has recently disclosed a code injection issue in Yamale, a popular schema validator for YAML that’s used by over 200 repositories. The issue has been assigned to CVE-2021-38305.

Get Cybersmart with JFrog This October

We live in a world of increasingly connected devices – phones, digital assistants, smart watches, cars, thermostats, refrigerators, windmills, and more. More than 50% of the world’s population is now online and two-thirds own a mobile device, according to the World Economic Forum. Additionally, the codebase of today’s applications typically consists mainly of open source components – exposing them to greater risk of hacking than ever before.

The Rising Tide of Data Breach Awareness

There’s an old saying that “there’s no such thing as bad publicity.” Unfortunately, this doesn’t ring true when it comes to data breaches and ransomware attacks. High profile security incidents continue to make headlines, and those headlines are impacting bottom lines. In response to these, the US federal government is modernizing its own cybersecurity infrastructure, and more state governments are implementing laws to protect citizens.

Sponsored Post

A guide to combat ransomware as we continue to work from home

It's no secret that 2021 has already seen a huge surge in ransomware attacks; we've seen an increase of 64% over last year. Advancements in attack strategies and the shift to remote work are undeniably reasons for this ongoing wave. With most businesses merely testing the waters with hybrid working models, completely returning to work still seems like a far-off reality indicating that these numbers are only likely to swell even further.