Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

geeks+gurus: Get real about cyber resilience

Join our geeks+gurus of Sumo Logic for an interactive conversation on the current state of cybersecurity, Demonstrating value is vital. In this 25-minute conversation, Bob Layton and Chas Clawson will Get Real about Cyber Resilience. With uncertainty around a potential recession and IT budgets flattening, security teams are learning how to do more with less. Cyber attacks are becoming more complex and destructive, however, more pressure is being put on security leaders to be more efficient with their spending and to make the case for these critical investments.

Top 5 uses of blockchain in supply chain

It’s April, designated National Supply Chain Integrity month by CISA, NCSC, ONCD and Department of Defense, to promote resources, tools, and information to help organizations and agencies secure their supply chains and build resilience. But what role does blockchain play in supply chain and how easy is it to implement? Blockchain technology has numerous potential applications in supply chain due to its ability to provide a secure, transparent, and tamper-proof ledger of transactions.

[Jaw-Dropper] FTX's Cybersecurity Was Hilariously Bad

4/11/2023 - Gizmodo just dropped this eye-roll inducing news. The disgraced crypto exchange had no dedicated cybersecurity staff and "protected" users assets with minimal safeguards, according to new bankruptcy filings. Here are just two paragraphs of the whole story. The whole thing is unbelievable.

Failing Less at Kubernetes with Policy as Code & OPA

Kubernetes has become the de facto way to run modern computing platforms, both in the cloud and on-premise. This is a huge change from just a few years ago, and it didn’t happen overnight. On the road to production readiness with Kubernetes, many have run afoul. Thanks to Kubernetes Failure Stories though, engineering teams from around the world have shared in detail what they did wrong and how they can avoid making the same mistake in the future.

Experts Monthly Mar23 20230411

Welcome back to the show! In this episode of the Razorwire podcast, I have the pleasure of discussing defence in depth with Razorthorn’s own illustrious consultants, Jamie Hayward and Tom Mills. During our conversation, we talked about the increasing number of tools and solutions available, the perils of ‘reactive’ budget allocation, as well as the changes we’re seeing in the industry and within our clients’ requirements.

Join the Conversation: Ask Me Anything w/ Pj Metz (ProjectDiscovery.io) from H.S. Educator to DevRel

Join us for an interactive dialogue between BoxyHQ host Nathan Tarbert and guest Pj Metz (@metzinaround) from ProjectDiscovery.io, who shares his valuable insights as a previous High School teacher and making the leap into tech to get his start in Developer Relations.

What is SOC 2 and how do you achieve SOC 2 compliance for containers and Kubernetes?

SOC 2 is a compliance standard for service organizations, developed by the American Institute of CPAs (AICPA), which specifies how organizations should manage customer data. SOC 2 is based on five overarching Trust Services Criteria (TSC): security, availability, processing integrity, confidentiality, and privacy. Specifically, the security criteria are broken down into nine sections called common criteria (CC).

Arctic Wolf Recognized as Top MDR Solution by G2

It’s good to be on top. G2 has recognized Arctic Wolf® Managed Detection and Response (MDR) as the top overall MDR solution. As the leader in security operations, we help thousands of organizations across industries and around the globe end cyber risk through 24×7 monitoring that helps organizations detect, respond, and recover from modern cyber attacks. It’s an honor to be recognized by G2.

ChatGPT's Role in the Evolution of Application Development

When I wrote my first applications in high school, coding was a lot more time-consuming. I didn’t have libraries I could shop through with ready-made bits of code to drop in to save myself time or bridge the gap between the pieces of code I could write to create something more complex. Instead, I had to write everything from scratch. If I wanted to include any kind of image, I would have to draw it with mathematical coordinates, which took a ton of time.