News Category: Security

Choosing a Tool to Track and Mitigate Open Source Security Vulnerabilities

To successfully deal with open source security, you need your developers (and DevOps teams) to operate the solution. Given the fast pace of modern development, boosted in part by the use of open source itself, an outnumbered security team will never be able to keep you secure. Therefore, the SCA...
Read 0 Comments

How to Measure the Efficacy of Your Container Security Solution with Real World Exploits

There has never been a better time to be a DevOps engineer. Compared to traditional web stacks, containerization has dramatically streamlined the task of deploying web services such as databases, key/value stores and servers. Furthermore, container orchestration tools, like Google’s Kubernetes and...
Read 0 Comments

Mitigating Known Security Risks in Open Source Libraries

This is an excerpt from Securing Open Source Libraries, by Guy Podjarny. Read the preceding chapter or view the full report. There are several ways to fix vulnerable packages, but upgrading is the best choice. If that is not possible, patching offers a good alternative. The following sections...
Read 0 Comments

The Effects of the Spectre and Meltdown Vulnerabilities

Spectre and Meltdown aren't anomalies. They represent a new area to look for vulnerabilities and a new avenue of attack. They're the future of security­ -- and it doesn't look good for the defenders. Modern computers do lots of things at the same time. Your computer and your phone simultaneously...
Read 0 Comments

How We Built an Intrusion Detection System on AWS using Open Source Tools

It’s roughly a year now that we built an intrusion detection system on AWS cloud infrastructure that provides security intelligence across some selected instances using open source technologies. As more instances were spun, real-time security monitoring became necessary. We wanted the capability to...
Read 0 Comments

Securing the Linux Filesystem with Tripwire

Linux users need to know how to protect their servers or personal computers from destruction, and the first step they need to take is to protect the filesystem. In this article, we'll look at Tripwire, an excellent tool for protecting Linux filesystems. Tripwire is an integrity checking tool that...
Read 0 Comments

Security with the Trusted Platform Module

The Trusted Platform Module on your computer's motherboard could lead to better security for your Linux system. The security of any operating system (OS) layer depends on the security of every layer below it. If the CPU can't be trusted to execute code correctly, there's no way to run secure...
Read 0 Comments

Strong Incident Response Starts with Careful Preparation

Through working every day with organizations incident response (IR) teams, I am confronted with the entire spectrum of operational maturity. However, even in the companies with robust IR functions, the rapidly evolving threat landscape, constantly changing best practices, and surplus of available...
Read 0 Comments

ZAP Provides Automated Security Tests in Continuous Integration Pipelines

Commonly, a mixture of open source and expensive proprietary tools are shoehorned into a pipeline to perform tests on nightly as well as ad hoc builds. However, anyone who has used such tests soon realizes that the maturity of a smaller number of time-honored tests is sometimes much more valuable...
Read 0 Comments

Spectre and Meltdown Attacks Against Microprocessors

The security of pretty much every computer on the planet has just gotten a lot worse, and the only real solution -- which of course is not a solution -- is to throw them all away and buy new ones. On Wednesday, researchers just announced a series of major security vulnerabilities in the...
Read 0 Comments

Pages

Click Here!