Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Threat Intelligence
Open Source Security
Threat Integrations
IntelOwl, an OSINT Tool discovering Threat Intelligence from multiple data sources

January 18, 2024

Threat Integrations
Compliance & Risk Management
Seamlessly Migrating Between Security Information and Event Management (SIEM) Solutions

October 5, 2023

Threat Integrations
Guardians of Your Data: SIEM vs. Log Management - Choose Your Cybersecurity Knight

October 5, 2023

Cloud Security
Open Source Security
Software Supply Chain Security
Dissecting “pypiele” – another malicious package hiding in the PyPI space

September 20, 2023

Threat Integrations
Handling Multiline Log formats using Regex and GROK Parser

July 20, 2023

Threat Integrations
Loginsoft developed Datadog Cloud SIEM integration for a leading SOAR platform

July 13, 2023

Cloud Security
Compliance & Risk Management
DevSecOps
Empowering CI/CD with Rego Policies

July 10, 2023

Software Supply Chain Security
DevSecOps
Securing the Software Supply Chain with Open Policy Agent: Policies for Pull Requests and Beyond

April 21, 2023

Cloud Security
Open Source Security
Software Supply Chain Security
Fortifying Cloud Security Posture Management with Open Policy Agent (OPA)

April 5, 2023

Network Security
Threat Integrations
Security Products: Challenge, Accessibility, Approach to test

January 19, 2023

Open Source Security
Software Supply Chain Security
Threat Intelligence
Discock Stealer - Another Polymorphic Malware like WASP Stealer

January 13, 2023

Threat Integrations
Threat Intelligence Connector for OpenCTI Cyber Threat Intelligence Platform

December 2, 2022

Sign up to our Newsletter