Third-Party GitHub Actions: Effects of an Opt-Out Permission Model
GitHub Actions, for good reason, is the go-to choice for countless developers. Despite its convenience, though, potential security risks accompany third-party actions. In this post, we share how the...
View ArticleContainer Escape: New Vulnerabilities Affecting Docker and RunC
A recent discovery identifies critical vulnerabilities affecting Docker and other container engines. Collectively called "Leaky Vessels", the vulnerabilities pose a significant threat to the isolation...
View ArticleMastering Data Flow: Enhancing Security and Compliance in the Cloud
Many organizations struggle to determine their data’s precise locations and pathways, making it challenging to ensure security and compliance throughout its lifecycle, as it crosses borders and...
View ArticleOpenAI Custom GPTs: What You Need to Worry About
The integration of OpenAI's Custom GPTs with personal data files and third-party APIs offers new opportunities for organizations looking for custom LLMs for a variety of needs. They also open the door...
View ArticleUnderstanding Three Real Threats of Generative AI
The New Reality of Generative AI Generative AI is a technology that has caught the attention of both good and bad actors. At its heart, the term generative AI refers to types of artificial intelligence...
View ArticleNot Just Another State of [Cloud-Native Security] Report
If you’re like me, you might be getting a tad exhausted keeping up with the many flavors of “The State of” reports. And I’m only talking about the ones within cybersecurity — everything from SBOMs to...
View Article