Sumo Logic Breach: What We Know So Far
On the 7th of November, Sumo Logic announced a security incident. Their security team detected the use of a compromised set of credentials to access a…
On the 7th of November, Sumo Logic announced a security incident. Their security team detected the use of a compromised set of credentials to access a…
Ingesting data in the security world is only half of the battle. The second half is fought over insight generation. As security professionals, we understand that every…
Cybersecurity is all about staying one step ahead of potential threats. With 1802 data compromises impacting over 422 million individuals in the United States in 2022,…
With over 7.3 million docker accounts created in 2021, Docker’s popularity has seen a meteoric rise since its launch in 2013. However, more businesses using it…
Whenever engineers discover a new security issue, the question arises every time: is this an exploit or vulnerability? What is a software vulnerability? How does it…
There’s no question that the last 18 months have seen a pronounced increase in the sophistication of cyber threats. The technology industry is seeing a macro…
What is infrastructure as code (IaC)? Infrastructure as Code (IaC) is the cloud-computing practice of putting the provisioning and configuring your cloud resources into machine-readable code. …
In our highly connected world, organizations of all sizes need to be alert to the risk of cyberattacks. The genuine threats to today’s enterprises include data…
In April 2022 alone, there were 14.3m records breached due to 80 significant security incidents. These incidents make up a complex, shifting landscape of cyberattacks that…