FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ Security – Cisco Blog

Seeing Inside the Vortex: Detecting Living off the Land Techniques

By: Matthew Robertson β€” November 11th 2025 at 13:00
Networking infrastructure is an often-overlooked threat surface being targeted by sophisticated threat actors. Learn more about this topic.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco XDR Just Changed the Game, Again

By: AJ Shipley β€” April 28th 2025 at 11:55
Clear verdict. Decisive action. AI speed. Cisco XDR turns noise into clarity and alerts into actionβ€”enabling confident, timely response at scale.
☐ β˜† βœ‡ Security – Cisco Blog

DevOps Decoded: Prioritizing Security in a Dynamic World

By: Gogulakrishnan Thiyagarajan β€” October 11th 2024 at 19:15
Integrating security into the DevOps lifecycle is essential for building secure, scalable systems. By embedding security early on, teams can mitigate risks, enhance efficiency, and ensure compliance throughout development and deployment.
☐ β˜† βœ‡ Security – Cisco Blog

The State of Cloud Security Platforms and DevSecOps

By: Kate MacLean β€” June 18th 2024 at 12:00
A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security
☐ β˜† βœ‡ Security – Cisco Blog

Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting

By: Jyotsna Venkatesh β€” June 17th 2024 at 12:00
Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Builds on the CNAPP Movement to Secure and Protect the Cloud Native Application Estate

By: Kate MacLean β€” June 10th 2024 at 12:00
Enterprise Strategy Group Report Identifies Crucial Requirements for Scalable Security, Multicloud Visibility, and True β€œShift Left” DevSecOps
☐ β˜† βœ‡ The Hacker News

DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed?

By: The Hacker News β€” May 24th 2024 at 10:35
Introduction The infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain attack (2020) were more than data leaks; they were seismic shifts in cybersecurity. These attacks exposed a critical challenge for Chief Information Security Officers (CISOs): holding their ground while maintaining control over cloud security in the accelerating world of DevOps.
☐ β˜† βœ‡ The Hacker News

Five Core Tenets Of Highly Effective DevSecOps Practices

By: The Hacker News β€” May 21st 2024 at 11:33
One of the enduring challenges of building modern applications is to make them more secure without disrupting high-velocity DevOps processes or degrading the developer experience. Today’s cyber threat landscape is rife with sophisticated attacks aimed at all different parts of the software supply chain and the urgency for software-producing organizations to adopt DevSecOps practices that deeply
☐ β˜† βœ‡ The Hacker News

AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs

By: Newsroom β€” April 16th 2024 at 13:26
New cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google Cloud can expose sensitive credentials in build logs, posing significant risks to organizations. The vulnerability has been codenamed LeakyCLI by cloud security firm Orca. "Some commands on Azure CLI, AWS CLI, and Google Cloud CLI can expose sensitive information in
☐ β˜† βœ‡ The Hacker News

Code Keepers: Mastering Non-Human Identity Management

By: The Hacker News β€” April 12th 2024 at 11:13
Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard
☐ β˜† βœ‡ Naked Security

S3 Ep142: Putting the X in X-Ops

By: Paul Ducklin β€” July 6th 2023 at 17:58
How to get all your corporate "Ops" teams working together, with cybersecurity correctness as a guiding light.

s3-ep100-js-1200

☐ β˜† βœ‡ Naked Security

Poisoned Python and PHP packages purloin passwords for AWS access

By: Paul Ducklin β€” May 24th 2022 at 23:04
More supply chain trouble - this time with clear examples so you can learn how to spot this stuff yourself.

☐ β˜† βœ‡ Naked Security

Pwn2Own hacking schedule released – Windows and Linux are top targets

By: Paul Ducklin β€” May 18th 2022 at 13:04
What's better? Disclose early, patch fast? Or dig deep, disclose in full, patch more slowly?

❌