How DevSecOps Can Secure Your CI/CD Pipeline

Many companies today automate their software development life cycle with continuous integration and continuous delivery (CI/CD). It’s part of the broader DevOps movement to speed software development while reducing errors. Continuous integration builds and tests code automatically, while continuous delivery automates the entire software release process up to production. In order to secure it, industry […]

The post How DevSecOps Can Secure Your CI/CD Pipeline appeared first on Security Intelligence.

Continue reading How DevSecOps Can Secure Your CI/CD Pipeline

Privileged Access Management: The Future of Cyber Resilience

Attacks against critical infrastructure and government agencies have been surging. Some attackers want to extort money; others intend to steal data. But the victims all have one thing in common: they need to be able to fend off attacks and recover so they can continue to perform their functions. That’s where cyber resilience comes in, […]

The post Privileged Access Management: The Future of Cyber Resilience appeared first on Security Intelligence.

Continue reading Privileged Access Management: The Future of Cyber Resilience

Ryuk Ransomware Operators Shift Tactics to Target Victims

The Ryuk ransomware operators continue to target critical infrastructure and extract high ransom payments from vulnerable groups, including an attack on a large health care organization last year. The victim has 90,000 employees and around 400 hospitals, outpatient clinics and behavioral health centers in the U.S. and U.K. During the attack, which shut down computers and […]

The post Ryuk Ransomware Operators Shift Tactics to Target Victims appeared first on Security Intelligence.

Continue reading Ryuk Ransomware Operators Shift Tactics to Target Victims

5 Ways Companies Can Protect Personally Identifiable Information

Protecting personally identifiable information (PII) is one of the key aspects of a security expert’s job. What does personally identifiable information include? Social Security numbers, birth dates and places, financial accounts and more can give threat actors a foothold to identify someone or steal their money or identity. This data could also be used to […]

The post 5 Ways Companies Can Protect Personally Identifiable Information appeared first on Security Intelligence.

Continue reading 5 Ways Companies Can Protect Personally Identifiable Information

What is STRIDE and How Does It Anticipate Cyberattacks?

STRIDE threat modeling is an important tool in a security expert’s arsenal. Threat modeling provides security teams with a practical framework for dealing with a threat. For example, the STRIDE model offers a proven methodology of next steps. It can suggest what defenses to include, the likely attacker’s profile, likely attack vectors and the assets […]

The post What is STRIDE and How Does It Anticipate Cyberattacks? appeared first on Security Intelligence.

Continue reading What is STRIDE and How Does It Anticipate Cyberattacks?

Under Attack: How Threat Actors are Exploiting SOCKS Proxies

From the basic building blocks of the internet to cryptocurrency mining on a supercomputer, SOCKS sits at the core of computing. A SOCKS proxy can be used to improve network security in an enterprise, but can also be exploited by cybercriminals for nefarious reasons. Take a look at how SOCKS proxies have been manipulated recently […]

The post Under Attack: How Threat Actors are Exploiting SOCKS Proxies appeared first on Security Intelligence.

Continue reading Under Attack: How Threat Actors are Exploiting SOCKS Proxies