Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Cloud Security
Open Source Security
Software Supply Chain Security
Dissecting “pypiele” – another malicious package hiding in the PyPI space

September 20, 2023

Threat Integrations
Handling Multiline Log formats using Regex and GROK Parser

July 20, 2023

Threat Integrations
Loginsoft developed Datadog Cloud SIEM integration for a leading SOAR platform

July 13, 2023

Cloud Security
Compliance & Risk Management
DevSecOps
Empowering CI/CD with Rego Policies

July 10, 2023

Software Supply Chain Security
DevSecOps
Securing the Software Supply Chain with Open Policy Agent: Policies for Pull Requests and Beyond

April 21, 2023

Cloud Security
Open Source Security
Software Supply Chain Security
Fortifying Cloud Security Posture Management with Open Policy Agent (OPA)

April 5, 2023

Network Security
Threat Integrations
Security Products: Challenge, Accessibility, Approach to test

January 19, 2023

Open Source Security
Software Supply Chain Security
Threat Intelligence
Discock Stealer - Another Polymorphic Malware like WASP Stealer

January 13, 2023

Threat Integrations
Threat Intelligence Connector for OpenCTI Cyber Threat Intelligence Platform

December 2, 2022

Vulnerability Management
Open Source Security
Open Vulnerability Assessment Language (OVAL) in a Nutshell - Part 2

August 27, 2022

Vulnerability Management
Threat Intelligence
Ransomware
Detecting Atlassian Confluence Exploitation - CVE-2022-26134

July 22, 2022

Threat Integrations
Cisco Umbrella Reporting Integration with Cortex XSOAR

March 31, 2022

Subscribe to our Newsletter