Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Runtime security in Azure Kubernetes Service

Runtime security for Azure Kubernetes Service (AKS) environments requires putting controls in place to detect unexpected and malicious behavior across your applications, infrastructure, and cloud environment. Runtime threats include things like: Even if you’re taking advantage of tools like container image vulnerability scanning, Kubernetes pod security policies, and Kubernetes network policies with AKS, not every risk will be addressed.

Cyber Security in 2021: Confident Detection and Response

As the volume and sophistication of cyber threats grow, it’s imperative that companies have the ability to rapidly detect and confidently respond to a variety of threats. Devon Ackerman, Head of Incident Response for Kroll’s Cyber Risk practice in North America shares how security leaders feel their organizations are inadequately resourced to run a mature detection and response program.

Cyber Security in 2021: Beware Increased Assault on Endpoints

The COVID-19 pandemic rushed security teams to find ways to support a largely remote workforce, changing the cyber threat landscape with increased opportunities for criminals to exploit vulnerabilities in the work from home environment. Jason Smolanoff, Global Cyber Risk Practice Leader at Kroll, outlines his one big thing for 2021 when it comes to cyber security: the increased assault on endpoints, which will force information security professionals to gain full visibility into a variety of devices and systems now operating outside of the company network.

Forward Fix: Streamlining and Scaling Automation Workflows

Technical Solutions Architect Glen Turner showcases how Forward can help solve enterprise automation problems. Enterprise IT organizations are promised speed, effectiveness, and efficiency through network automation, but rarely receive it. Foward Enterprise can help. Foward gives you effective network automation through collecting/parsing network state information, normalizing it into a vendor-agnostic data model, and exposing the model for workflow.

75% of Apps in the Healthcare Industry Have a Security Vulnerability

In light of the current pandemic, our healthcare industry has been challenged like never before. Healthcare workers heroically stepped up to the plate, caring for those in need, while the industry itself digitally transformed to keep up with the influx of patient data and virtual wellness appointments.

Using Strategic Choices to Ensure Continuous and Effective Cyber Security

Organizations are overwhelmed by the choice of cyber security tools in the market. They need to balance prioritizing and remediating vulnerabilities with managing their secure configurations. What’s more, many organizations are using hybrid clouds where they need to protect assets that are hosted both on premises and in the cloud. This complexity requires a thoughtful approach to cyber security.

Top 5 Construction Technology Trends to Watch in 2021

The construction industry is not unfamiliar with disruption. In 2008, the Construction Engineering Index plunged 68 percent. Firms that survived the financial crisis that year faced severe margin pressure – dropping from 5 percent in 2007 to 1 percent by 2010. The industry had to act fast and looked for more innovative ways to cut costs and boost profitability. The industry had to act fast and looked for more innovative ways to cut costs and boost profitability.

5 Best Practices for Security Logging in the Cloud

Logs are critical for detecting and investigating security issues. They also provide essential visibility into business operating environments. Many organizations, when they are small and just starting out, can get away with using a local log server and storage to collect data. Almost all security teams start off with this kind of on-premises logging approach. Most teams use an open-source, homegrown solution for this type of short-term, small-scale log analytics.