-
**Describe the task**
AS identified in the STRA, work with ITSM to get foundational items in place.
**Acceptance Criteria**
- [x] FAM Confluence page created (https://apps.nrs.gov.bc.ca/int/confluenc…
-
New rules requiring publicly-listed firms to disclose serious cybersecurity incidents within four days have been adopted by the US Securities and Exchange Commission (SEC).
The tough new rules, alt…
-
Developed a page where users can report any incidents or suspicious activities. The information collected through this feature is used to improve the safety measures and provide valuable insights.
-
Hi everyone.
I know this is not a bug, but I do not know where can i get information about this. I have xsoar access information, and website url is https://demisto.example.com/ for example.
Wha…
-
Good afternoon. I am a Linux engineer my name is Kirill. I was inspired by your product and the fact that it can deploy terminal environment and vdi on unix like system. Close examination of the produ…
-
#### As if attacks from China weren't enough, one of the Air Force's own has reportedly gone rogue
The US government is fighting a pair of cyber security incidents, one involving Chinese spies who …
-
**Describe the issue**
CKV_AWS_338 may report false positives when a shorter log retention is chosen than 1 year.
**Examples**
```hcl
resource "aws_cloudwatch_log_group" "v2" {
name = "test-l…
-
Hi again,
a usual recommendation in post-mortem analyses for high-profile incidents in npm, RubyGems, etc is that 2FA should be required.
(I don't have the links for that at hand but that hopef…
-
see https://github.com/Clinical-Genomics/IT-issues/issues/531
>We're writing to let you know that the names of the organizations your GitHub account is a member of, if any, were likely viewed as pa…
-
### How to use GitHub
* Please use the 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to show that you are interested into the same feature…