Passwords are obsolete. Memorizing long and complicated passwords has been holding back businesses for over 50 years, while cyberattacks are evolving every day. ¹ In fact, Google has registered over 2 million phishing sites as of January 2021. The figure is up from 1.7 million in January 2020, a 27% increase year on year. ² […]
Cloud Security
Technology, security threats and competition – they all change rapidly and constantly. Your security stack must therefore be ahead of every emerging threat, but just as importantly, enable full-speed business processes by reducing friction in critical workflows.
-
Case Study: GlobalDots helps Pagaya automate headcount hypergrowth with Okta Workflows IT and Security never played well together: Unscalable and overworked, they believe their interests to be conflicting. But in reality, both struggle to keep up with the demands of the business for speed and growth. Today, new technologies empower both functions with automations that help the organization move faster and augment scalability and security alike. […]
24th August, 2021 -
RCE in Cdnjs and What It Means to You Last week, a researcher named RyotaK shared a clever supply chain vulnerability in Cloudflare’s highly popular hosted module called cdnjs, which runs on around 12% of all sites on the web. The module helps developers consume other popular packages and integrate them safely into their sites. The vulnerability was in the cdnjs library update server […]
19th July, 2021 -
Automated Vulnerability Remediation – Solution Brief New software vulnerabilities are exposed at an alarming rate, compelling vendors to release multiple patches, overwhelming IT and lnfoSec teams. At the same time, the key approach to dealing with vulnerabilities – Patching – consists of manual steps and handshakes that makes this critical process tedious and inefficient. Meet the solution which empowers you to: […]
16th June, 2021 -
Report: State of CNAS, Q2 2021 As companies embrace cloud native technologies as part of their digital transformation, security becomes key to delivering software products faster and error-free. This latest survey by Snyk: Evaluates the latest cloud-native development trends. Demonstrates how Cloud Native App Security (CNAS) fits into CI/CD. Reveals what still keeps some companies from moving to cloud-native platforms. Fill […]
16th June, 2021 -
eBook: Move Beyond Passwords Identity & Access Management (IAM) is perhaps the most basic fundamental of any up-to-date security stack. In cloud-centric environments, which are distributed by nature, this is twice as true: Remote access from poorly-secured networks and a quickly-growing attack surface, rich with insider threats, both need to be restrained. IAM is therefore the first and foremost […]
16th June, 2021 -
The Complete Guide to SOC 2 Automation As important as it is to achieve SOC 2 compliance, the manual work involved, along with all the minutia required, often leaves CISOs and Compliance leaders feeling overwhelmed at the prospect of preparing for audits. But preparing for, and ultimately achieving, SOC 2 compliance doesn’t need to be complicated or overwhelming. Today, organizations are starting […]
16th June, 2021 -
Practicing Security in Open Source Communities Open source projects are the embodiment of the core philosophy: ‘free internet and technology for everyone around the globe’. They can be created, changed and distributed to anyone by anyone and for any purpose. Contributing to an open source projects is an endorsement of this philosophy, that promotes digital literacy in technological and non-technological communities. […]
31st May, 2021 -
SolarWinds Orion Security Breach: A Shift In The Software Supply Chain Paradigm The recent SolarWinds breach highlights a new paradigm in the Software Supply Chain. When compared simply to the code itself without any additional tools, Proprietary Code is no more secure than Open Source. By contrast, many would argue that Open Source Code is more secure due to a faster fix/patch/update cycle and the pervasive access to source […]
31st May, 2021 -
How-To: Automated NS1 Provisioning with Okta Workflows While Okta and NS1 support SAML Authentication, Provisioning and de-provisioning users still requires manual work. We hate manual work, so here’s a way to automate the entire process, end-to-end, using Okta Workflows. Still unfamiliar with Workflows? Start here. Setting the Scene On NS1’s portal, Create an API Key for Okta Workflows. 2. On Okta Workflows […]
31st May, 2021 -
Defining Developer-first Container Security Have you shifted left yet? That’s the big trend, isn’t it? It’s meant to signal a movement of security responsibilities, moving from central IT teams over to developers, but that’s trickier than it sounds. Simply taking tools that are intended for use by security experts and making them run earlier in the supply chain does not […]
31st May, 2021 -
Adapting Security to Work Anywhere “Working from home 2021″ marks a massive shift away from common workspaces in response to the global pandemic. There is no more working remotely or working from home, there is just working. The axiom, “work is what you do, not where you go” has never before been so true. The possibility for the workforce to be location independent […]
31st May, 2021 -
Massive Campaign Targeting UK Banks Bypassing 2FA On 14 July, 2020, Oliver Hough, a security researcher from Cyjax, published a report centered on a phishing campaign targeting banking customers in the United Kingdom, which evades two-factor authentication (2FA). On 16 December, 2020, researchers from the Global Threat Intelligence Team at WMC disclosed that they were tracking a threat actor who goes by the alias “Kr3pto”. […]
31st May, 2021