Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Is GitOps and How Will it Impact Digital Forensics?

GitOps is arguably the hottest trend in software development today. It is a new work model that is widely adopted due to its simplicity and the strong benefits it provides for development pipelines in terms of resilience, predictability, and auditability. Another important aspect of GitOps is that it makes security easier, especially in complex cloud and containerized environments.

Connect Kintent's Trust Cloud to Your CRM

Keeping your sales and security teams in sync on the progress of security questionnaires can be painful. Frustration due to lack of transparency can occur, which tends to add friction to the sales process. This is because answering a security questionnaire and going through security reviews is a team sport, and sales people always want to know the latest status.

ManageEngine captures the Cyber Defense Global InfoSec Awards 2022 spotlight with 5 top honors

At the RSA Conference in San Francisco on June 6, Cyber Defense Magazine celebrated the 10th Annual Cyber Defense Global InfoSec Awards. A prestigious honor in the information security space, the award recognizes businesses that have pioneered cutting-edge solutions to combat current as well as future cyberthreat trends. Of the more than 4,000 reputable information security organizations that took part in this prestigious award, three of our solutions were recognized.

SOC for Cybersecurity- Everything You Should be knowing

Cybersecurity has always been a major concern for most businesses. With the growing incidents of data breaches, it is now imperative for businesses to invest their resource in securing their IT infrastructure and data. Moreover, after the COVID-19 scenario, there was an unprecedented spike in the need for remote working. This totally hampered the security measures implemented by the organization’s IT and Cybersecurity teams.

Ransomware Landscape Q2

The first quarter of 2022 was rich with many unusual incidents of new ransomware groups, and new techniques. The most notable event of Q1 was without a doubt the ContiLeaks incident, courtesy of the Russia-Ukraine conflict, which lasted till not long ago, at the end of Q2. As the shockwaves of the Russia-Ukraine conflict have faded, when it comes to the ransomware industry, we have seen many families going “back to business”.

DevSecOps monitor and decommission

This is the final article of the DevSecOps series and how it overlays onto DevOps lifecycle. In the first article, we discussed build and test in DevSecOps. In the second article, we covered securing the different components of the deploy and operate process. The final phases of the DevOps lifecycle are monitoring the deployed applications and eventually decommissioning when they are no longer needed.

How to Deploy Pods in Kubernetes?

Kubernetes leverages various deployment objects to simplify the provisioning of resources and configuration of workloads running in containers. These objects include ReplicaSets, lSets, Sets, and Deployments. A pod is the smallest deployment unit in Kubernetes that usually represents one instance of the containerized application.

Seamless path to Zero Trust for Texas: Lookout Receives TX-RAMP Level 2 Certification

Here at Lookout we have a long tradition of supporting the cybersecurity requirements of all levels of government in the U.S. This is why I’m thrilled to announce that we have received a Level 2 certification, the highest tier of authorization, from the Texas Risk and Authorization Management Program (TX-RAMP).