Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Defend Your Data Now with the MITRE ATT&CK Framework

MITRE is a not-for-profit organization that operates federally-funded research and development centers. Their ATT&CK framework is a useful cybersecurity model illustrating how adversaries behave and explaining the tactics you should use to mitigate risk and improve security. ATT&CK stands for “adversarial tactics, techniques and common knowledge.”

Privileged Access Management Best Practices Using SSH and Teleport

Gravitational CTO, Sasha Klizhentas, goes through the best practices for setting up privileged access management when using SSH to access cloud-native server infrastructure. He also describes how these concepts are applied to Teleport - privileged access management for elastic infrastructure that doesn't get in the way.

Autonomous cars: Data will drive the future

You might have not noticed it, but we are on the verge of a disruptive change in the way we humans transport ourselves. In the next five to ten years the way we think about – and take – our daily commute, our holiday vacation, trips to the market – anything that involves transport over a distance too great to walk – will dramatically change.

Questions You Should Ask Your Cloud-Based Log Management Service Provider

The log management service is often outsourced to a third-party service provider due to the complexity of the process involved in the collection of logs. When a business plans for outsourcing log management to a service provider, business requirements must be given a top-most priority. To start with, a business must identify the goals it desires to accomplish through log management. After locating the required resources, the decision-making body should select a vendor for availing its services.