Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

JFrog Discloses 5 Memory Corruption Vulnerabilities in PJSIP - A Popular Multimedia Library

JFrog’s Security Research team is constantly looking for new and previously unknown security vulnerabilities in popular open-source projects to help improve their security posture. As part of this effort, we recently discovered 5 security vulnerabilities in PJSIP, a widely used open-source multimedia communication library developed by Teluu. By triggering these newly discovered vulnerabilities, an attacker can cause arbitrary code execution in the application that uses the PJSIP library.

4 ways automation can improve your security posture

Security is top of mind for many organizations—and for good reason. Recovering from a data breach is extremely costly. In fact, the average data breach costs more than $8.6 million in the US. One of the best ways to defend against cyberthreats is by adopting and implementing security automation.

How certificates work in Puppet

This video gives you a basic introduction to certificates and explains how they’re used to secure Puppet communications. Certificates help to provide secure connections between different parts of your infrastructure as those parts communicate with each other. When you run the agent for the first time, it submits a CSR (Certificate Signing Request) to the primary server. Then the CSR is reviewed by the Puppet administrator and either accepted or denied.

Ransomware Cost Hospitals Nearly $21B Last Year. How Protected Are You?

Today, as computing power and wireless capabilities improve, organizations are increasingly leveraging Internet of Medical Things (IoMT) technologies, such as internet-connected blood pressure monitors, continuous glucose monitors and MRI scanners. These tools, with their ability to collect, analyze and transmit health data, improve efficiencies, lower care costs and drive better patient outcomes.

How to Test Salesforce Multi-Factor Authentication

Assuming you have correctly configured the user ids for MFA authentication in Salesforce, end-users should see the following screen when trying to login into the CRM application. The TOTP-based verification code is generated in third-party authenticator apps (Google or Microsoft) on your mobile device when you first scan the QR code or enter the key manually in the app. In this article, we’ll guide you through all the steps you need to set up our Salesforce MFA Web Sensor in your environment.

Featured Post

Is Remote Working a Cybersecurity Risk?

The Covid-19 pandemic had a huge impact on employment. Perhaps one of the most important was the rise in remote working. Some workers chose to work remotely to protect themselves - others were asked to as a part of a plan from their company to help limit the spread of the virus among members of staff.

How to Get Started Securing Your Internal Software Supply Chain

Defining, building, and delivering a secure software supply chain is challenging for many organizations. Software builds utilize many open source components, and the vast landscape of cloud native developer and platform tools grows more extensive and more diverse every day. Developers, operators, and security teams must work together to ensure software is delivered swiftly and securely to meet business and customer desires.

Introducing BGP monitoring from Kentik

Designed at the dawn of the commercial internet, the Border Gateway Protocol (BGP) is a policy-based routing protocol that has long been an established part of the internet infrastructure. Historically, BGP was primarily of interest to ISPs and hosting service providers whose revenue depends on delivering traffic.