Aqua Security's Cloud Native Threat Report in 5
Aqua Security’s research lab “Team Nautilus”, recently released their Cloud Native Threat ...
The Who's Who of Cyber Criminals in 5
Several cyber security breaches have made headlines in the past year and you would be ...
Google's Open Source Vulnerabilities (OSV) project in 5
Google has been busy developing projects to move the security needle forward for users of ...
Software Bill of Materials (SBOM)'s in 5
In 2020, sophisticated hackers compromised Solarwinds’ development pipeline and embed a ...
Application Logging Basics in 5
Logging within web applications are crucial for supporting cyber security monitoring and ...
Log Structures and Formats in 5
The format of a log dictates the quality and therefore the value of the log for ...
Cloud Logging Layers in 5
Logging within public Cloud environments, such as Azure, differ in several ways compared ...
Splunk’s Common Information Model in 5
Continuing on the theme of log standardization, let’s dive into Splunk’s Common ...
An Introduction to Google’s SLSA in 5
Google has recently introduced the Supply chain Levels for Software Artifacts or SLSA ...
Supporting a Great Cause with a Pie to the Face
Here at Mirai Security, we are strong believers in community and contributing back. Since ...
The 2020 Open Source Security and Risk Analysis Report in 5
Synopsys who develops the Software Composition Analysis platform BlackDuck, released ...
Golden SAML Attacks in 5
In 2017, CyberArk conceptualized a new attack technique called the “Golden SAML”. Coined ...