Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Sue Bergamo on Data Security Decoded - On Diversity

Dive deep into the world of #CyberSecurity leadership in this episode of Data Security Decoded, featuring Sue Bergamo, CISO and CIO at BTE Partners. Sue brings to the table an incredible perspective on the importance of diversity and the strength of unique perspectives. Sue advocates for empowering individuals to stand up for their ideas, especially when navigating through incidents, ensuring a resilient and innovative response to any crisis.

DORA Compliance: Insights & Strategies with Paul Dwyer | Razorwire Podcast | Razorthorn Security

The deadline for financial entities is looming – get actionable information and advice on DORA compliance with industry expert Paul Dwyer! Welcome to Razorwire, your go-to podcast for cutting-edge insights and expert analysis in the world of information security. I'm your host, Jim, and in today's episode, we have the privilege of speaking with Paul Dwyer, a veteran in cybersecurity risk and compliance with over 30 years of experience and the head of the International Cyber Threat Task Force (ICTTF).

Unlocking the Power of Kubernetes Data Management: Mastering CSI and Non-CSI Snapshots for Enhanced Security and Efficiency

In the rapidly evolving landscape of containerized applications, robust data backup solutions are essential. This is particularly true in production Kubernetes environments, where data integrity and availability are paramount. This post explores the critical roles of CSI snapshots & Non-CSI snapshots in Kubernetes, and how CloudCasa by Catalogic enhances data protection and management capabilities across diverse Kubernetes deployments.

Data Catalogs: What They Are & Why They're Important

A data catalog is a critical data repository that enables visibility into what data you have, where it’s going, and who owns it – all critical inputs for maintaining data security. A company's data needs to be both organized and centralized, while also easily being discoverable. In this article, we’ll explore what data catalogs are and how they can create business value in your organization.

Mission Possible: Securing Developer Access, CI/CD and Code (With Love)

Okay, so you’re a security leader at your enterprise – congratulations! It’s a big, challenging role, as you know too well. You or a colleague are likely responsible for securing the cloud and legacy apps that drive critical revenue and customer engagement for your organization. But it’s not just the apps you need to secure.

Cybersecurity Tips for Traveling Employees: A Summer Guide

As the warm summer months roll in, many of your employees are likely planning vacations and business trips. While these travels can offer much-needed breaks and valuable business opportunities, they also present unique cybersecurity challenges. As a Managed Security Service Provider (MSSP), we understand the importance of protecting your company’s data, no matter where your employees are. Here are some essential cybersecurity tips to keep in mind for your traveling workforce this summer.

Log it like you mean it: Best practices for security

Not every log is equal As solutions architects at Elastic, we receive a lot of questions around how to fine-tune a security environment, such as: The answer is often, "it depends." So, we’d like to explore the parameters behind these questions to provide you with a more comprehensive understanding of how they influence the response.