Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Talking visibility, scalability, and relationships in secure development with Phil Guimond of ViacomCBS

I recently caught up with Phil Guimond, Principal Cloud Security Architect at ViacomCBS. He describes his role as a fancy way of saying he likes to be involved in All The Things™. This includes cloud security and architecture, application security, penetration testing, and digital forensics and incident response, and even vendor reviews and risk management from time to time. He works in a very cross-functional team. We had a great discussion, and I wanted to share it with all of you.

1Password Developer Fireside Chat: Dive into Async & Futures in Rust

Senior developer, Nathan West, digs into the advanced concurrency benefits made possible by Async and Futures in Rust. Nathan explains the differences between Rust Futures and JavaScript Promises, discussing the way Async/Await relate, before demonstrating the implications of these capabilities by building out a series of demonstrative code examples.

Optimizing Cloud Security Efficacy & Performance Through a Single-Pass Architecture

Cybersecurity has a bad rap for getting in the way of business. Many CIOs & CISOs dedicate a lot of time to minimizing security solutions’ performance drag on their network traffic while ensuring that the solutions continue to do their job keeping the network secure. The move to the cloud exacerbates this challenge.

How Dockershim's Forthcoming Deprecation Affects Your Kubernetes

Container orchestration platform Kubernetes announced in December 2020 that its third and final release, Kubernetes v1.20, would deprecate dockershim and subsequently Docker as a container runtime. This deprecation has brought multiple changes that admins must be aware of and accordingly respond to.

Life Science Top 10 Market Trends for 2021

For over a year the future has lacked clarity. As parts of the world start to open up and the life sciences industry ramps back up to pre-pandemic activity, the fog of uncertainty is starting to lift. We are seeing an acceleration of digital transformation across the Life Sciences industry with the adoption of decentralized trials, real world evidence, and remote monitoring.

Ingesting threat data with the Threat Intel Filebeat module

The ability for security teams to integrate threat data into their operations substantially helps their organization identify potentially malicious endpoint and network events using indicators identified by other threat research teams. In this blog, we’ll cover how to ingest threat data with the Threat Intel Filebeat module. In future blog posts, we'll cover enriching threat data with the Threat ECS fieldset and operationalizing threat data with Elastic Security.