Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

SOC for Cybersecurity- Everything You Should be knowing

Cybersecurity has always been a major concern for most businesses. With the growing incidents of data breaches, it is now imperative for businesses to invest their resource in securing their IT infrastructure and data. Moreover, after the COVID-19 scenario, there was an unprecedented spike in the need for remote working. This totally hampered the security measures implemented by the organization’s IT and Cybersecurity teams.

Ransomware Landscape Q2

The first quarter of 2022 was rich with many unusual incidents of new ransomware groups, and new techniques. The most notable event of Q1 was without a doubt the ContiLeaks incident, courtesy of the Russia-Ukraine conflict, which lasted till not long ago, at the end of Q2. As the shockwaves of the Russia-Ukraine conflict have faded, when it comes to the ransomware industry, we have seen many families going “back to business”.

DevSecOps monitor and decommission

This is the final article of the DevSecOps series and how it overlays onto DevOps lifecycle. In the first article, we discussed build and test in DevSecOps. In the second article, we covered securing the different components of the deploy and operate process. The final phases of the DevOps lifecycle are monitoring the deployed applications and eventually decommissioning when they are no longer needed.

How to Deploy Pods in Kubernetes?

Kubernetes leverages various deployment objects to simplify the provisioning of resources and configuration of workloads running in containers. These objects include ReplicaSets, lSets, Sets, and Deployments. A pod is the smallest deployment unit in Kubernetes that usually represents one instance of the containerized application.

Seamless path to Zero Trust for Texas: Lookout Receives TX-RAMP Level 2 Certification

Here at Lookout we have a long tradition of supporting the cybersecurity requirements of all levels of government in the U.S. This is why I’m thrilled to announce that we have received a Level 2 certification, the highest tier of authorization, from the Texas Risk and Authorization Management Program (TX-RAMP).

KuppingerCole rates SECUDE as outstanding in extending Microsoft Purview Information Protection (MPIP)

We are excited to share that SECUDE has been rated “Outstanding in Extending Microsoft Purview Information Protection” in the KuppingerCole Market Compass for Secure Collaboration, May 2022. SECUDE was awarded the highest possible score of “Strong Positive” in the following categories: security, deployment, and usability.

What is Database Security? Learn how to secure databases

Databases are essential for organisations because they store data critical for the organisation to function. This data can include customer information, financial records, and contact details. Organisations need to access this data quickly and securely to make decisions and run their business. A database can help them do this by providing a centralised location for all their data.

Random but Memorable - Episode 9.9: The Passwordless Special

It's the Passwordless Special! 🎉😱 We sit down with 1Password's Matt O'Leary and Ernest Chi to discuss the future of passwords and passwordless authentication, including recent developments and challenges to passwordless technologies. Grab a cuppa, and settle in as we predict what a passwordless future might look like.