Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Identity Orchestration and Authorization with Gerry Gebel

Welcome to another insightful episode of Cloud Unfiltered! In this episode, host Michael Chenetz is joined by Jerry Gebel, VP of Product and Standards at Strata Identity, to delve into the crucial topics of identity orchestration and authorization. Outshift is Cisco’s incubation engine, innovating what's next and new for Cisco products and sharing our expertise on emerging technologies. Discover the latest on cloud native applications, cloud application security, generative AI, quantum networking and security, future-forward tech research, our latest open source projects and more.

Network Vulnerabilities Assessment: Benefits & Steps

Securing a network against cyber threats requires a thorough understanding of its vulnerabilities. A vulnerability assessment is a detailed process aimed at identifying, evaluating, and ranking potential weaknesses within a network setup. From examining configurations to assessing access controls, this assessment dives deep into every aspect of the network to uncover areas of vulnerability.

Transforming Sales Enablement: The New Era of Lab Engine

For years now, 11:11 Lab Engine has helped IT administrators navigate the pressures of our fast-paced, global business environment. With IT departments around the world facing increasing workloads and an array of new technical challenges, Lab Engine has allowed organizations to rapidly deploy and scale virtual environments for everything from testing, quality assurance, and training to marketing events and sales experiences. Indeed, an invaluable tool.

The Importance Of Verifying Your GitHub Environment's Security Controls

Security is a top priority of every company. It’s not surprising… Source code, the most critical asset of any organization, should be under reliable protection… especially in view of constantly arising threats. Ransomware, infrastructure outages, vulnerabilities, and other threats can strike your GitHub repository at any time.

Strengthening Cyber Resilience in the Defense Industrial Base

The Defense Industrial Base (DIB) consists of over 100,000 companies that provide materials or services to the United States Department of Defense (DoD). These companies provide products needed to defend the nation and are a critical part of the DoD supply chain. DIB companies range in size from large, well-known defense contractors, like Lockheed Martin, Boeing and Northrop Grumman, to small and medium-sized enterprises that provide specialized products and services, such as drones and military vehicles.

How To Know if Your Information Is on the Dark Web

You can find out if your information is on the dark web by using a dark web scan tool, signing up for a dark web monitoring service or checking for the latest data breaches. The dark web is a layer of the internet that allows people to remain anonymous, often used by cybercriminals to find and sell stolen personal information. A dark web scan informs you if your personal information has surfaced on the dark web, which could put your accounts at risk of being compromised.

7 Important Theft Protection Features for a Cryptocurrency Wallet

While you don’t always need a cryptocurrency wallet to trade blockchain assets, using a good wallet to facilitate exchanges is a matter of common sense. Wallets don’t just provide a convenient way to manage your crypto funds, but they also help keep your tokens safe from the malicious parties that are all too commonplace in the world of blockchain currencies.

Inside Look: How SenseOn's Security Engineering Team Perfects Their Detection Analytics

In the Security Engineering team at SenseOn, we are constantly seeking methods to achieve big goals with minimal input. This is where our focus on automation becomes essential. If you peek inside our team, you’ll find a trove of unique and effective automation tools that aid us on our journey. From small Python scripts to GitHub actions to Slack bots, we have it all.

Over 1 Million websites are at risk of sensitive information leakage - XSS is dead. Long live XSS

Cross-site scripting (aka XSS) has rightfully claimed its place as one of the most popular web vulnerabilities. Since its first emergence, somewhere in the dark days of the internet, countless vulnerabilities have been found across websites everywhere. Therefore, it comes as no surprise that XSS has been consistently highlighted as a top risk in the OWASP TOP-10 since the list's very first iteration in 2004!