Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing page collections

In January of this year, we introduced the ability to build apps with Tines. That launch marked an evolution of our pages feature, from forms into a powerful capability for collaboration and communication. Since then, we iterated quickly with features like self-submitting pages, multiple buttons, wider pages, advanced formatting options, and saved themes. One request we received time and time again was pages within pages. Our users wanted to surface a collection of pages from a single reference point.

Unveiling the Chaos: Navigating the Security Nightmare in Modern DevOps and CI/CD Environments

Dive deep into the tumultuous world of modern software development in our latest video, where we unravel the complexities and security pitfalls of CI/CD, DevOps, and DevSecOps. Many believe they've fortified their tools, boasting secure Ansible, Jira, and Jenkins, only to find their GitHub wide open. Join us as we dissect the challenges of transitioning from the development environments of the past to the cloud-centric landscapes of today.

Rubrik Expands SaaS Data Protection to Atlassian Jira Cloud: Now Available

With Atlassian ending support in February 2024 for Jira Software Server – an on-premises deployment of Jira Software - what’s your plan for data protection if you choose to migrate to the cloud? While Atlassian has plenty of tools in place out of the box to protect your data, there’s always more you can do to help prevent data loss.

Squash Scattered Spider Attacks with Forward Networks' Blast Radius

I hate spiders, a lot. But I really hate the idea of a Scattered Spider Attack which can jump between environments that you may have believed were segmented at an alarming rate. That is the stuff of real nightmares for networking and security professionals. Keeping up with your security posture isn’t easy. We’re all doing our best, but is it good enough? One CISO we talked to hired a consulting firm to map out their security posture.

12 Christmas Scams to Watch Out for This Holiday Season

On the twelfth day of Christmas, my true love gave to me... hopefully something better than a virus (computer or otherwise). As the end of the year is fast approaching, it has not been without its fair share of data breaches, hacks, and even the return of digital piracy. As we enter December and fast approaching the most wonderful time of the year, hackers, cybercriminals, and online fraudsters are looking to end the year with a bang.

CyberLink Breached Through Supply Chain Attack By North Korean Hackers

Recently, the Microsoft Threat Intelligence Team has discovered a supply chain attack executed by North Korean attackers. The prime victim of this attack was CyberLink, a multimedia software company headquartered in Taiwan. This strategic infiltration in the CyberLink infrastructure impacted globally present customers, risking data integrity and confidentiality.

Different Types of Windows 10/11 Updates You Must Know

Whether it’s an application or an operating system, every software needs an update to optimize performance, align with trends, and fulfill dynamic user requirements. The same is the case with the Windows 10/11 operating system. Microsoft, the developer of Windows OS, releases several updates for its product. In this blog, you will get to know about each one of them thoroughly. So, let’s get started by understanding the process behind it.