Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud

Why Embrace a Cloud Operating Model?

Taking on the concept of a cloud operating model is not just for people who want to be fashionable; it's a clever tactic that any business can use if they desire efficient scaling and better service delivery. This method uses the benefits of cloud computing to make operations simpler, more flexible and less costly.

What is Azure Identity Protection and 7 Steps to a Seamless Setup

Protecting credentials has become increasingly critical in recent years, with everyday employees using more passwords, devices, and systems than ever before. Remote work has significantly increased the risk of identity attacks. 55% of remote workers say they receive more phishing emails than they used to while working in the office and attempted password attacks are up tenfold. In 2023, Microsoft detected 156,000 business email compromise (BEC) attacks every day over twelve months.

Teamwork for Internet security: Rapid response & compliance

Host João Tomé is joined by two guests. First, we have Ranee Bray, Chief of Staff of our Security Team, discussing how we managed programmatically what we called Code Red — several teams were put together to focus in 30 days on strengthening, validating, and remediating a security incident. Credential management, software hardening, vulnerability management, additional alerting, and other areas were also a part of the “Code Red” effort.

Teaser. Half a Century of Connectivity: Celebrating 50 Years of TCP

In May 1974, 50 years ago, Vint Cerf and Bob Kahn made history with their paper on TCP (Transmission Control Protocol) published by @IEEEorg. Here is a teaser of a longer video (and "This Week in Net" episode) coming soon from our protocol experts, Mark Nottingham (Australia), and Lucas Pardue (UK).

Comparing OPA/Rego to AWS Cedar and Google Zanzibar

Rego, the policy language of the Open Policy Agent (OPA), is known for its flexibility and power in policy enforcement across various systems. Its declarative syntax and data-centric approach make it versatile for application authorization, infrastructure as code (IaC) authorization, and network policies. To fully appreciate OPA/Rego’s capabilities, it’s helpful to compare it with other policy languages and frameworks like AWS’s Cedar and Google’s Zanzibar.

Cloud Unfiltered with Andre Zayarni - Exploring AI and Vector Databases - Episode 13

Join your host Michael Chenetz as he interviews André Zayarni, the CTO of Qdrant, a leader in AI innovation with their cutting-edge vector database technology. This conversation is essential listening for anyone interested in the integration of advanced search technologies and AI in modern applications.

How to Leverage Video Technology for Comprehensive Security Solutions

Video technology in security protocols has come a long way since the old days of black-and-white footage. Those changes transformed video surveillance from a simple observer to an active participant in strengthening business security solutions. With innovations that range from high-resolution images to cloud storage and advanced analytics, organizations are equipped with a reliable tool to aid in privacy control and safety.

Learning from cloud transformation as we move to AI

Development teams of all sizes are embracing the excitement and possibility of using AI tools to build software. Coding assistants like Google Gemini and Github Copilot have the potential to accelerate development like never before, and developers are adopting these tools — whether or not leadership has officially approved them. As your team considers the best ways to adopt this new technology, this transition might feel like déjà vu.