Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Contain a Privileged Access Breach Quickly and Effectively

If an adversary manages to gain control of a privileged account in your network, you may face serious consequences, including costly data loss, prolonged downtime, customer churn, and legal and compliance penalties. This blog explains how to build an effective incident response plan that can help you minimize the damage from a breach.

Zero Trust: The Case for Just-in-Time Access

Traditional IT security models focused on one thing: keeping the bad guys out the network. Anyone inside the network was physically in the corporate office and logged on to a machine set up and managed by the IT team, so they were trusted implicitly. That model no longer works. Today’s world of cloud resources, remote workers and user-owned devices has blurred if not entirely erased the notion of a network perimeter that could be defended.

Customize Your GitGuardian Remediation Workflow

Have you ever wished you could customize the remediation workflow in your GitGuardian workspace? Now, you can! As a workspace Manager, you can manage the remediation workflow in the Secrets detection section of your settings and add up to 20 steps. You can also switch between the default GitGuardian remediation workflow and your custom remediation workflow.

Automating incident Remediation with GitGuardian Playbooks

GitGuardian can help automate your incident remediation process through our playbooks! The auto-healing playbook automates sharing the incident with the developer involved. Whenever a new incident is detected, GitGuardian automatically turns on the sharing option of the incident and, in most cases, sends an email with the unique link to the developer involved.

Warning: Sharing Data with ChatGPT Can Be Misused Outside Your Organization

A new study found that ChatGPT can accurately recall any sensitive information fed to it as part of a query at a later date without controls in place to protect who can retrieve it. The frenzy to take advantage of ChatGPT and other AI platforms like it has likely caused some to feed it plenty of corporate data in an effort to have the AI process and provide insightful output based on the queries received.

CVE-2023-34362: MOVEit Transfer SQL Injection Vulnerability Actively Exploited in the Wild

On May 31, 2023, Progress released a security advisory warning customers of a critical zero-day vulnerability being actively exploited in MOVEit Transfer, a managed file transfer (MFT) solution. The exploitation of this vulnerability could lead to escalated privileges and potential unauthorized access to an environment, allowing threat actors to steal data and extort organizations.