Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud

Applying Least Privilege in Kubernetes II Jonathan Canada

Scalability and Cloud-Native have driven the demand for Kubernetes, but the developer now has the harder task of building applications in a secure manner. This talk will focus on best practices for implementing least privilege and enforcing zero trust principles within Kubernetes clusters. A how-to for implementing robust Role Based Access Control (RBAC) tied into the corporate SSO/Identity provider using Teleport.

Adopting Zero Trust and SASE as Fed and SLED Agencies Go Remote-First

The global pandemic further accelerated a trend toward remote work that was already underway, even in federal, state, and local agencies that previously resisted it. But as agencies continue to offer telework options to employees, they must also rethink their security stack to better mitigate the cybersecurity risks that remote work catalyzes. Traditional, perimeter-based approaches to security will no longer work in a cloud-first environment where data can, and is, accessed from just about anywhere.

Best Practices for Securing Your Cloud Service

The popularity of cloud services has soared in recent years, as ever more companies move towards a remote or hybrid workplace model. While cloud computing comes with many benefits, it can also create new vulnerabilities that might give criminals access to your sensitive data. If your company is using cloud technology, you need to make sure that your data is secure. Keep reading to learn what threats affect cloud services and what you can do to keep your cloud safe.

Low Latency Identity-aware Access Proxy in Multiple Regions

A multi-protocol access proxy is a powerful concept for securing access to infrastructure. But accessing numerous computing resources distributed across the globe via a single endpoint presents a latency challenge. Today we are announcing that the hosted edition of Teleport Access Plane is now available in 5 regions all over the world.

Netskope Private Access Demo - Browser Access (Clientless)

In this video, we will demonstrate the new client-less Browser Access capabilities in Netskope Private Access (NPA). We will walk you through the configurations and show you how to securely enable access to web applications for contractors, suppliers, and other 3rd party users as well as employee BYOD.

Netskope Selected to Participate in ATARC Zero Trust Lab

We are pleased to share that Netskope has been selected by the Advanced Technology Academic Research Center (ATARC) as one of 49 vendors to participate in its Zero Trust Lab. The Zero Trust Lab is a state-of-the-art physical and virtual test environment that will provide federal agencies with the opportunity to build, test, and evaluate new Zero Trust Architectures in a simulated environment.

Forward Fix Live: Extending Zero Trust in the Cloud

Trying to make sense of your cloud security posture shouldn't mean flipping between multiple screens and inferring how traffic is behaving. Join this live event to see how you can monitor and verify your security posture across multiple clouds on a single screen.

Secure DevOps on Google Cloud: Reduce cloud and container risk

Google Cloud is helping businesses build and deploy apps faster than ever before, but at the same time, cloud teams must consider how to implement secure DevOps practices to avoid risk. We’re partnering with Google Cloud to provide security solutions to cloud teams to simplify safeguarding cloud and containers. Today, we announced our collaboration with Google Cloud.

How to meet 24 Google Cloud Platform (GCP) security best practices using open source Cloud Custodian and Falco

You’ve got a problem to solve and turned to Google Cloud Platform to build and host your solution. You create your account and are all set to brew some coffee and sit down at your workstation to architect, code, build, and deploy. Except… you aren’t. There are many knobs you must tweak and practices to put into action if you want your solution to be operative, secure, reliable, performant, and cost effective.