Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Applying Military Mindset to Cyber Security: A Holistic Approach

In this video, we explore how the military mindset and training can be applied to the cyber security domain. With a focus on defense in depth and a holistic approach to security, individuals in the forces community bring a unique perspective to the field. From personal weapons to security centers and countermeasures, the skills and methodologies learned in basic training can be translated to the cyber security space. By managing multiple streams and having a wider oversight of all domains, the elements can fit together seamlessly for a comprehensive and effective cyber security strategy.

Using the Azure PKI Solution for IoT Security

Public Key Infrastructure (PKI) is a set of policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. The purpose of PKI is to facilitate secure electronic communications by authenticating users and devices. Organizations that use PKI can be assured that their messages are confidential and tamper-proof because each message is encrypted with a unique key that only the intended recipient can decrypt.

OneLogin and AWS CloudTrail Lake Integration

As an AWS Partner, One Identity is proud to announce that it is now even easier to leverage your existing AWS tooling with your OneLogin data. We are among the first partners to offer a new integration that joins tools, such as our previously released AWS EventBridge webhook. Now, AWS and One Identity have teamed to deliver an integration with AWS CloudTrail Lake, which allows you to store your OneLogin event data in AWS along with all your other data.