Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

Google Cloud - Reservation

Google Cloud Platform (GCP) provides users with the ability to make reservations, allowing them to reserve virtual machine instances and save costs. With GCP reservations, users can plan and allocate their computing resources more effectively. By reserving instances ahead of time, users can ensure that their applications have the necessary compute capacity, while also benefiting from significant cost savings compared to on-demand pricing.

Step-by-Step: Setting Up SMTP for Backup Alerts in BDRSuite

If you’ve implemented BDRSuite in your environment and think you’re finished, you might be mistaken. Following the implementation of a backup and restore strategy, it’s crucial to implement proper monitoring. Firstly, you want to know the health state of your backup infrastructure and the underlying layer. Secondly, you want to know whether the scheduled backup jobs have succeeded or failed. This is where SMTP, or Simple Mail Transfer Protocol, comes into play.

WSUS: Create Computer groups in WSUS - Part 4

In the last three articles, we covered the introduction to WSUS, installation, and initial configuration. In this article, we will talk about computer groups and explain how to create one. Computer groups help you organize your computers and target updates to them at a convenient time. For instance, you can create a computer group called ‘Accounting’ and assign all accounting machines to it.

5 ways Vanta customers saved time and money automating their SOC 2

SOC 2 is a popular compliance framework used to evaluate and validate an organization’s information security practices. By getting a SOC 2 report, you’ll be able to develop a trusting relationship with your customers, unlock new revenue opportunities, and build a strong security posture. ‍ The process of getting your SOC 2 often takes significant time, effort, and resources.

The Kubernetes network policies you need today

In the dynamic world of Kubernetes, container orchestration is just the tip of the iceberg. In this sophisticated ecosystem, you must prioritize security efficiency. Kubernetes’ robust, open-source platform has been revolutionary in automating the deployment, scaling, and management of application containers. Yet, such capability comes with significant responsibility, particularly in network security. Here, the role of network policies becomes crucial.

Evaluating the differences: What businesses should know about PCI DSS v4.0 versus v3.2.1

In the realm of payment security, the Payment Card Industry Data Security Standard (PCI DSS) provides a critical framework that guides businesses to protect cardholder information against breaches and fraud. As the digital landscape evolves and cybersecurity threats become increasingly sophisticated, the PCI DSS sets guidelines and requirements for securing payment card data, with periodic updates to address emerging threats.

AppSec Vulnerability Management: Uniting AppSec and CloudSec

Businesses have come a long way in their individual journeys to digital transformation, all to enhance their customer and workforce experiences. This shift elevated the importance of both Application Security (AppSec) and Cloud Security (CloudSec) in safeguarding digital assets and ensuring infrastructure resilience.

Account Takeover Attack Live Simulation

Account takeover attacks have increased by 354% y-o-y in 2023. What’s worse? It takes 11 months to solve an ATO breach. By that time, attackers would have laterally traversed your entire digital infrastructure, including databases. So, how do you protect your organisations against sophisticated ATO attacks that even bypass 2FA? In this live attack simulation, Karthik Krishnamoorthy (CTO) and Vivekanand Gopalan (VP of Products) demonstrate various ways in which account takeover can happen, along with practices to protect your websites and APIs against ATO attacks.

DevOps Security - Best Data Protection Practices

DevOps has already become an integrated part of almost every industry. Whether it’s technology, automotive, healthcare, or any other industry, it’s hard to imagine an organization that doesn’t rely on DevOps. Numbers speak better: the majority of consumers are from the technology sector – 44 %, yet there are a lot of organizations from other industries that depend on DevOps – financial, education, etc.

Steps to Creating a Statement of Applicability (SOA)

A Statement of Applicability (SOA) is a document you draft as part of achieving compliance with ISO 27001 and other ISO standards. The SOA reviews the internal controls you have decided to include in your information security management system (ISMS) and why you selected those controls. Writing a thoughtful, comprehensive SOA is crucial to your ISO 27001 compliance journey.