Join us

ContentUpdates from Profisea...
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

CrowdStrike is the latest cybersecurity vendor to bring generative AI into its tools

CrowdStrike is set to roll out a generative AI assistant called Charlotte, which will answer users' questions about vulnerable systems and recommend actions in real-time based on an analysis of threat intelligence. The company has trained Charlotte on its own information security events, telemetry a.. read more  

Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Microsoft, GitHub announce application security testing tools for Azure DevOps

GitHub announces the widely available application security testing tool for subscribers of Microsoft's Azure DevOps service - GitHub Advanced Security for Azure DevOps. The tool helps identify vulnerabilities and prevent exposure of secrets in Azure Repos while providing guidance to mitigate these i.. read more  

Microsoft, GitHub announce application security testing tools for Azure DevOps
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Intelligence Insights: April 2023

CrowdStrike's recent report reveals that the Labyrinth Chollima threat moved up in rank, with a significant increase in activity. The report also highlights a supply chain compromise involving malicious code in a softphone application. Defender preparation, detection, and response are key to reducin.. read more  

Intelligence Insights: April 2023
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

AWS KMS Threat Model

AWS KMS offers different options for key management; letting AWS manage the key is a common query, however. AWS offers three options for encryption: their own manage key (transparently), AWS key management with limited control or customer-managed key (CMK)... read more  

AWS KMS Threat Model
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

The Dark Side of DevSecOps and the case for Governance Engineering

DevSecOps pipelines and golden paths secure the software delivery pipeline but not the entire development lifecycle. Monitoring production and implementing Governance Engineering can detect unauthorized changes, ensure compliance, and mitigate risks for a more secure DevOps environment... read more  

The Dark Side of DevSecOps and the case for Governance Engineering
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Fingerprinting pfSense using GitHub analysis

Penetration testers use GitHub repositories to find vulnerabilities in open source applications. They analyzed the pfSense repository to determine the version of the target application. They wrote scripts to retrieve directory contents and compare files across different versions, saving the results .. read more  

Fingerprinting pfSense using GitHub analysis
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

How to Perform a Network Security Risk Assessment

Ensuring network security: The importance of conducting a comprehensive network security risk assessment to safeguard against cyberattacks, address vulnerabilities, and build trust with stakeholders and customers... read more  

How to Perform a Network Security Risk Assessment
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

What to Look for When Selecting a Static Application Security Testing (SAST) Solution

Discover how to choose the right vulnerability scanning product for your business and get started with vulnerability scanning... read more  

What to Look for When Selecting a Static Application Security Testing (SAST) Solution
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

What is SaaS Security? - Types, Challenges, Threats & Protection Guide

SaaS security protects data and applications in cloud environments. It includes data protection, access controls, infrastructure security, application security, incident response, and compliance. Organizations should choose reputable providers, implement encryption and strong authentication, monito.. read more  

What is SaaS Security? - Types, Challenges, Threats & Protection Guide
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Integrating DAST Into Your CI/CD Pipeline: Benefits and Implementation

Integrating Dynamic Application Security Testing (DAST) into your CI/CD pipeline helps detect web application vulnerabilities early, improves security, speeds up time-to-market, and reduces costs. Choose the right DAST tool, start early in the development process, schedule regular scans, prioritize .. read more  

This organization doesn't have a detailed description yet. If you are the administrator of this organization, please claim this page and edit it.