Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How to create an identity federation between GCP and AWS using Tines

In this guest blog post, Marcus Hallberg and Attila Dulovics, senior security engineers at Spotify, share a Tines workflow they built to create identity federation between GCP and AWS. As modern organizations continue their journey into the cloud, they face the complex reality of a mix of cloud providers and on-premise infrastructure. This often happens due to acquisitions being made, necessary partner integrations, or other business and technical requirements that create a multi-cloud setup over time.

SANS report: Securing the shifting landscape of application development

Major shifts in application development are creating new and significant security risks. Continuous integration/continuous delivery (CI/CD) pipelines and technology advances like automation and AI mean the development process is now so complicated and fast-moving that corporations, DevOps directors, and security groups struggle to understand and manage it, let alone defend it from assaults.

Introducing Time-Limited Access

As an enhancement to Keeper’s secure sharing capabilities, Time-Limited Access allows you to securely share credentials or secrets with other Keeper users on a temporary basis, automatically revoking access at a specified time. Time-Limited Access prevents long standing privileges and ensures that information is removed from the recipient’s vault, greatly reducing the risk of unauthorized access. Time-Limited Access brings several key benefits to users and administrators.

Trustwave Named a Major Player in the IDC MarketScape: Worldwide Cybersecurity Consulting Services 2024 Vendor Assessment

Trustwave was named a Major Player in the IDC MarketScape: Worldwide Cybersecurity Consulting Services 2024 Vendor Assessment (doc # US50463223, March 2024). The report noted “The acquisition by MC2 Security Fund — the private equity fund of internationally recognized security advisory firm The Chertoff Group — successfully closed in January 2024.

Striking a Balance Between Productivity and Security

Granting privileged access to an end user’s device is a common practice in organizations. Admins do it to give end users the ability to manage administrative tasks such as downloading applications and accessing resources on their devices. It can be done manually, which is cumbersome and introduces risks. Or it can be managed to improve user productivity without requiring additional IT help or intervention, so that IT can focus on higher priority tasks.

Unlocking the Future: The Journey to Biometric Security with Brivo

In today's fast-paced world, security is more important than ever. But with great security comes great responsibility – and sometimes, complex processes. Join us at Brivo as we dive deep into the world of biometric security, exploring the intricate journey of enabling biometric access control. From scanning at multiple locations to understanding the sophisticated technology behind it, we've got you covered. 🌐🔍

The Impact of FAIR on Risk Management with Jack Jones | Razorthorn Security

Welcome to Razorwire, the podcast that cuts through cybersecurity and risk management complexities. Host Jim welcomes Jack Jones, creator of the FAIR risk methodology, for an in-depth discussion on how his approach has transformed information security risk perception and management. Jack shares his journey from facing scepticism to global recognition, detailing the development of FAIR and its impact on the industry. He also previews his upcoming book on the controls analytics model, exploring the future of risk management and FAIR's role in advancing cybersecurity practices.

ITAM & CMDB - ServiceNow Integration - Tanium Tech Talks #85

See how Tanium can feed your ServiceNow CMDB with fresh asset inventory on today's Tanium Tech Talk. We're going to start at the beginning with asset data: hardware, software, usage, and more. Many Tanium customers update their ServiceNow CMDB multiple times per day to enjoy the benefits of accurate and timely asset data. SERVICE GRAPH CONNECTOR IS THE PREFERRED METHOD. VIDEOS IN THIS SERIES.