Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CEL and Kubescape: transforming Kubernetes admission control

Admission control is a crucial part of the Kubernetes security, enabling the approval or modification of API objects as they are submitted to the server. It allows administrators to enforce business logic or policies on what objects can be admitted into a cluster. Kubernetes RBAC is a scalable authorization mechanism, but lacks the fine grained control over different Kubernetes objects. This creates the need for another layer of control which is Admission Policies.

Why AI Guardrails Need Session-Level Monitoring: Stopping Threats That Slip Through the Cracks

AI guardrails are vital for ensuring the safe and responsible use of AI/large language models (LLMs). However, focusing solely on single prompt-level checks can leave organizations vulnerable to sophisticated threats. Many company policy violations and security risks can be cleverly split across multiple, seemingly innocent queries. To effectively protect against these threats, a more comprehensive approach is needed — session-level monitoring.

Gen AI Guardrails: 5 Risks to Your Business and How to Avoid Them

As businesses increasingly adopt Generative AI (Gen AI) to enhance operations, customer engagement, and innovation, the need for robust AI guardrails has never been more critical. While Gen AI offers transformative potential, it also introduces significant risks that can jeopardize your business if not properly managed. Below, we explore five critical risks associated with Gen AI and provide strategies to avoid them.

Continuing to Evolve Next-Gen Asset Attribution Through Service Provider Collaboration

One of the primary reasons that the Bitsight Security Rating is widely respected and closely correlated with real-world security outcomes is the scale and sophistication of our asset attribution capabilities. In a recent post, my colleague Francisco Ferreira shared an update on the momentum building with Bitsight Graph of Internet Assets (GIA), the AI-powered engine we use to map assets to organizations and build our Ratings Trees.

Hunting with the LimaCharlie Query Console - Webinar

Managing various data sources and retaining data can be a hassle for SecOps teams. LimaCharlie removes this headache by providing one-year of telemetry storage for any data type - EDR, cloud provider logs, authentication logs, and many more. This allows your organization to preserve a valuable source for threat hunting and anomaly detection. Watch this webinar where we explore LimaCharlie’s Query Console, and learn how you can structure queries to quickly hunt through any historical data set, find value, and uncover hidden gems.

Supercharge Team Productivity with Essential Jira Integrations

Looking to supercharge your team's productivity, optimize project management, and enhance security within Jira? Look no further! Watch the session where six Atlassian Marketplace vendors - Move Work Forward, Reliex, SaaSJet, Release Management, OBoard, and GitProtect.io - united their efforts to share best practices & insider tips for streamlining your workflows and productivity, boosting collaboration, and protecting your Jira data.

Defending Against Attacks on Data with Rubrik and the CrowdStrike Falcon Platform

In today's digital landscape, cyber attacks are an ever-present threat, and they all ultimately target one thing: data. For most organizations, the challenge lies not only in protecting this data but also in understanding the full scope of what they have. Many organizations struggle to identify how much sensitive data they possess, where it resides, and who has access to it.