Open in app

Sign In

Write

Sign In

Jon Goldman
Jon Goldman

72 Followers

Home

About

Mar 31, 2022

SAST vs DAST vs SCA vs Secrets scanning

Most DevSecOps or AppSec know the difference and could answer what each perform, but do you? SAST stands for Static Application Security Testing. Most SAST solutions perform scans and identifies vulnerabilities as developers code. …

Secrets

3 min read

Secrets

3 min read


May 17, 2021

How to detect and respond to DarkSide Ransomware attack

Quick summary The operator of the nation’s largest gasoline pipeline — hit earlier this week by ransomware attack — announced Saturday it has resumed “normal operations”. …

Ransomware

4 min read

How to prevent against DarkSide Ransomware attacks
How to prevent against DarkSide Ransomware attacks
Ransomware

4 min read


May 5, 2021

Understanding the Kubernetes Attack Surface

Let’s cover the basics first, the 4C’s is what does that mean. The 4C’s of Cloud Native security are Cloud, Clusters, Containers, and Code. Note: This layered approach augments the defense in depth computing approach to security, which is widely regarded as a best practice for securing software systems. Here…

Kubernetes

6 min read

Understanding the Kubernetes Attack Surface
Understanding the Kubernetes Attack Surface
Kubernetes

6 min read


Apr 15, 2021

Interaction with Check Point SandBlast via API

This article will be useful to those who are familiar with Check Point technologies for emulation of files ( Threat Emulation ) and proactive cleaning of files ( Threat Extraction ) and want to take a step towards automating these tasks. Check Point has a Threat Prevention API that works…

Sandboxing

4 min read

Interaction with Check Point SandBlast via API
Interaction with Check Point SandBlast via API
Sandboxing

4 min read


Mar 24, 2021

Docker Container Security tips and tricks

Docker security is an ever-evolving area to be updated about since this part of the technology keeps changing at fast pace. We will cover few basic topics you should be aware of from technical standpoint. Even though there are alot of articles around this topic and most famous front-runners in…

Docker

2 min read

Docker

2 min read


Feb 12, 2021

What is Kubernetes, technically?

Kubernetes, also known as K8s, is an open-source system for automating deployment, scaling, and management of containerized applications according to kubernetes.io but if we look at it closer under the hood let’s see what it is actually and technically :) Launching a single node Kubernetes cluster, we will use Minikube(https://github.com/kubernetes/minikube)…

Kubernetes

4 min read

What is Kubernetes, technically?
What is Kubernetes, technically?
Kubernetes

4 min read


Feb 12, 2021

Solarwinds use-case: Check Point NGFW + Siemplify SOAR: Reducing Risk and Response Time to Critical Attacks. Integration and partnership

What is Siemplify? Siemplify is a SOAR Platform company and is Check Point’s strategic partner in SOAR space. Siemplify was born out of the need for a better, simpler, more effective way to manage security operations. Siemplify is built by security operations experts who spent years honing their skills on…

Soar

5 min read

Siemplify SOAR and Check Point Software integration and partnership
Siemplify SOAR and Check Point Software integration and partnership
Soar

5 min read


Nov 22, 2020

How about that Web Application and API Security?

About 3 years ago Gartner Research company coined the term WAAP which stands for Web Application and API Security which is mouth full to say it instead what we used to just call it a WAF in the industry. There are so many solutions that offer WAAP as SaaS or…

Web Security

3 min read

How about that Web Application and API Security?
How about that Web Application and API Security?
Web Security

3 min read


Nov 2, 2020

What to do when Ransomware Activity Targeting the Healthcare Sector?

TrickBot — What began as a banking trojan and descendant of Dyre malware, TrickBot now provides its operators a full suite of tools to conduct a myriad of illegal cyber activities. These activities include credential harvesting, mail exfiltration, cryptomining, point-of-sale data exfiltration, and the deployment of ransomware, such as Ryuk and Conti. …

Threat Hunting

1 min read

Threat Hunting

1 min read

What to do when Ransomware Activity Targeting the Healthcare Sector?

TrickBot

What began as a banking trojan and descendant of Dyre malware, TrickBot now provides its operators a full suite of tools to conduct a myriad of illegal cyber activities. These activities include credential harvesting, mail exfiltration, cryptomining, point-of-sale data exfiltration, and the deployment of ransomware, such as Ryuk and Conti.

…

--

--


May 3, 2020

WAF vs IPS vs FW vs Zero day attack

Before we dive into this topic, let’s first briefly cover types of cyber threats these technologies can detect and prevent. Firewall is like a doorman; sits at the perimeter, he keeps everyone out who tries to sneak in via open basement-windows-roof etc, but once someone enters through the official door…

Web Application Security

4 min read

WAF vs IPS+FW and why you need both
WAF vs IPS+FW and why you need both
Web Application Security

4 min read

Jon Goldman

Jon Goldman

72 Followers

Cloud Security, Automation, DevOps, AWS, Azure, GCP

Following
  • Ismail Tasdelen

    Ismail Tasdelen

  • The Good Men Project

    The Good Men Project

  • Tim Denning

    Tim Denning

  • Sean Kernan

    Sean Kernan

  • Asmita Karanje

    Asmita Karanje

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech