Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Teleport 12 Is Here!

After 4 months of hard work we’re proud to announce the release of Teleport version 12! From expanded Windows and Kubernetes support, to a preview of a brand new feature we’re calling Device Trust, Teleport 12 is loaded with improvements and new capabilities that make it easier than ever to securely access your entire infrastructure ecosystem.

Will Biden's National Cybersecurity Strategy Trigger AppSec Change?

Every federal administration for the past 20 years has issued a cybersecurity strategy, so in one sense the National Cybersecurity Strategy issued by the Biden administration on March 2, 2023 is not unexpected. The big difference, however, lies in the recommendations: For the first time, the government is pressing for regulatory mandates on key industry sectors that control wide swathes of critical infrastructure nationwide.

BeyondCorp, Federal Zero Trust Architecture Strategy and Teleport

"Crunchy on the outside, chewy in the middle". That's how Google described its perimeter-based security targeted high-profile companies such as Google, Adobe, Akamai, Rackspace, etc., with said primary reason of modifying the source codes. In response, Google initiated a perimeter-less and trustless access control system now popularly known as BeyondCorp. BeyondCorp comes from a realization that VPN perimeter network security is obsolete.

CloudCasa and Ondat Bring Best-of-Breed Bundled Offering for Stateful Applications

CloudCasa by Catalogic and Ondat have joined forces to offer customers a combined solution stack to run and manage stateful applications on Kubernetes and provide best-of-breed performance, availability, data protection and recovery. In this episode of TFiR: Let’s Talk, Swapnil Bhartiya sits down with the executives of both companies, CloudCasa COO Sathya Sankaran and Ondat CEO Richard Olver, to talk about their partnership.

Just Who Exactly Should Take Responsibility for Application Security?

Recent high-profile software supply chain breaches have sharpened the focus on application security. But as cybersecurity professionals know all too well, concern doesn’t always equate to action. In theory, the rise of DevSecOps best practices that shift responsibility for application security further left should reduce the number of vulnerabilities that now routinely make it into production applications. However, real life is a little messier.

Using ggshield Throughout The Software Development Lifecycle - A Developer's View of GitGuardian

Take a tour of how developers commonly use ggshield, the free and open source GitGuardian CLI to find hardcoded secrets. We will also see how developers participate in the remediation process. In this video demo, see: Learn more at docs.gitguardian.com

sysctl configuration hardening

Sysctl is a command-line utility in Unix-like operating systems that allows users to view and modify kernel parameters at runtime. These parameters, also known as “tunable” or “kernel” parameters, control various aspects of the operating system’s behavior, such as network settings, memory management, file system behavior, and more. Each of these operating systems has their own implementation of sysctl, with slightly different options and syntax.