Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

Deploying Calico in Your On-prem Kubernetes Cluster: Networking and Security Considerations

If you are deploying Kubernetes on-premises in your datacenter, this is a talk and demo you won’t want to miss. Networking and security might not be the first things that come to mind, but without some understanding of the networking and security decisions you’ll need to make, and the right options for your environment, you’re likely to get stuck or make the wrong assumptions. These may limit your ability to scale or integrate with the rest of the datacenter network.

The perfect storm: How digital transformation is reshaping security and networking

Think back to the end of 2019. Enterprises were evolving IT infrastructure at a moderate pace to reduce costs, be more competitive, and improve their ability to adapt to an increasingly digitized world. Whether migrating workloads to the cloud, virtualizing network functions, diversifying mobility, or moving applications and services closer to the edge, digital transformation was steadily evolving the business landscape.

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments. Dubbed DCShadow, this is a late-stage kill chain attack that allows a threat actor with admin (domain or enterprise admin) credentials to leverage the replication mechanism in AD to register a rogue domain controller in order to inject backdoor changes to an AD domain.

How will comply-to-connect (C2C) help you with compliance assessment?

“Trust but verify” is a common phrase in the DoD, usually referring to managing people or tasks. In order to build trusted network environments, cyber administrators need to know that their security and management tools are working properly, and that connecting endpoints and users are compliant with security policies. So how will C2C capabilities help you with compliance assessments?

How will comply-to-connect (C2C) help you gain control?

Zero Trust, Access Control, Least-Privileged Access -- call it what you want, trust within a network is an opportunity for Administrators to excel … or get fired. Administrators must continually balance user access to mission data and services with security measures to protect those functions, and policy-based automation is the only way to keep up. So how will C2C capabilities help you gain control?

How will comply-to-connect (C2C) provide automated orchestration of your tools?

“Silos of excellence” can create havoc between security teams and can also adversely impact to your user’s experience, or even their connectivity. Keeping all your tools in synch can be a daunting manual mistake-laden challenge. So how will C2C capabilities provide automatic orchestration of your tools?

What is Zero Trust Security and how can you enforce it?

Zero Trust Security, an alternative architecture for IT security was first introduced by Forrester and was rooted in the principle of 'never trust, always verify'. Zero trust security has come a long way since then. My message for companies that think they haven't been attacked is: You are not looking hard enough." James Snook Each enterprise and individual is at risk today given our huge dependency on the Internet.

Outpost24 webinar - Preventing wireless attacks with device visibility and effective controls

In 2020 we’ve seen a growing number of security professionals become more aware of wireless threats and the majority lack confidence in how to prevent them impacting their business. Join our webinar as we discover the key trends in wireless security from our recent RSA 2020 survey and Internet of Evil Things report. Our wireless expert will explore the different challenges we face in securing our network airspaces and combatting the most common threats by creating more effective classification of risk assessment through automation.

Outpost24 Webinar: Common Wireless Security Threats and How to Avoid them

The #1 challenge for busy security professionals is how can you secure what you don’t know about? 100% of companies has reported finding rogue consumer devices lurking on their enterprise network, highlighting the risk of airborne attacks. Join our webinar to learn how best to discover full scope of what you own and spot anomalies before rogue devices turn malicious.