Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Modern SOC and MDR services series I: What they are, why they matter

Inadequate cybersecurity is a severe issue that challenges SMBs and enterprises indiscriminately, putting them at risk. Reasons for the business impact include: To help businesses navigate cybersecurity risks, many delegate to internal or external security operation centers (SOC).

How to secure Helm

Helm is being used broadly to deploy Kubernetes applications as it is an easy way to publish and consume them via a couple of commands, as well as integrate them in your GitOps pipeline. But is Helm secure enough? Can you trust it blindly? This post explains the benefits of using Helm, the pitfalls, and offers a few recommendations for how to secure it. Let’s get started!

How Sysdig is Using the ThreatQ Platform to Enhance Cloud Threat Detection and Response

It is always interesting to learn about real-world examples of technologies at work. So, when ThreatQuotient invited me to share how we at Sysdig are using the ThreatQ Platform to enhance our cloud detection and response solutions, I was happy to participate.

2022 Elastic Global Threat Report: Helping security leaders navigate today's threat landscape

Staying up-to-date on the current state of security and understanding the implications of today’s growing threat landscape is critical to my role as CISO at Elastic. Part of this includes closely following the latest security threat reports, highlighting trends, and offering valuable insights into methods bad actors use to compromise environments.

5 best practices for building modern access control for cloud applications

Recently, I met with Or Weis — a Snyk Ambassador — to discuss access control in the cloud. Or is an entrepreneur, based in Tel Aviv, where he founded Permit.io, a solution that empowers developers to bake in permissions and access control into any product in minutes and takes away the pain of constantly rebuilding them.

World Economic Forum Cybersecurity Conference Opens in Geneva

The World Economic Forum (WEF) Centre for Cybersecurity will host its annual meeting focusing on cybersecurity from November 15-16 in Geneva, Switzerland. Among the primary themes for the 2022 event is cyber resilience, with a focus on organizations developing the proper leadership and cooperation to deal with the growing threat landscape.

As volumes continue to rise, precious metal traders must be cyber vigilant

In times of economic volatility, precious metals are a safe harbor for investors of all sizes. This has been reflected in choppy pricing for metals such as gold, which, according to CNBC, have only just settled down after weeks of gradual rise against a weakening dollar.

Using the MITRE ATT&CK framework to understand container security

As innovations in the world of application development and data computation grow every year, the “attack surface” of these technologies grows as well. The attack surface has to be understood from two sides—from the attacker’s side and from the organization being attacked.

Make Cloud Defense a Team Sport by Turning DevOps into a Force Multiplier

Enterprises are embracing cloud-native applications in the name of business agility. These applications enable developers to take advantage of the cloud’s scalability and flexibility, allow customers and developers to benefit from the increased velocity of DevOps processes and help businesses quickly react to customer needs and potentially lower their cost of deployment.