Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

RSA Conference 2023: Key Takeaways From Our Five Favorite Sessions

RSA 2023 is a wrap, but that doesn’t mean we are finished with the annual event. Sharing information, success stories, and lessons learned lies at the heart of RSA. And after a week of talking to attendees and pundits, giving demos, and gleaning knowledge from a slew of sessions, it’s going to take some time to sort through all the treasure from that trove of knowledge. For starters, here are a few of the more noteworthy sessions we saw at the show.

Quickly onboard engineers and protect infrastructure with Teleport as a SAML and IDP

In this episode, we’ll go over how companies protect access to applications using Teleport. This webinar will focus on the workflow for quickly onboarding engineers to access your infrastructure and highlight how teams can use Teleport as a SAML and IDP for apps and websites. In the latter half of the session, we'll delve deeper into the technical intricacies of SAML and share valuable tips for enhancing the security and modernization of your IDP through the implementation of passwordless authentication. Don't miss this opportunity to bolster your organization's access security with Teleport.

Mend.io Collaborates with Kondukto's New Demo Hub

When you’re trying to choose the right application security solution, navigating the options on the market can be bewildering. At Mend.io, we know that software developers and DevOps professionals use multiple tools to identify security issues in different stages of the software delivery life cycle and different code types. And we’re dedicated to making every aspect of AppSec as seamless as possible, which includes making your solution selection as easy as it can be.

Are you worried about the security of your software supply chain?

GitGuardian Honeytoken has got you covered. You can deploy honeytokens at scale, monitor for unauthorized use, and detect intrusions in your supply chain before they can cause any damage to your assets. Honeytokens are unique, decoy credentials that can be placed across your software delivery pipeline, giving you the ability to track unauthorized access attempts in real time. They allow you to monitor when, where, and how attackers are trying to access your assets. This way, you can take proactive measures to prevent attacks before they happen.

Root Cause Analysis for Deployment Failures

Root Cause Analysis (RCA) is a technique used to identify the underlying reasons for a problem, with the aim of trying to prevent it from recurring in the future. It is often used in change management processes to help identify the source of any issues that arise following any modifications to a system or process. RCA is something Tripwire Enterprise is often deeply tied into too.

Why is Cybersecurity Now a Global Governmental Concern?

Governments everywhere are increasingly concerned about implementing frameworks to improve the protection of personal and commercial information and defend national security against cyberattacks. I was recently in Australia, and it was hard to ignore the news that the Australian government released a discussion paper to shape its work on its 2023 – 2030 cybersecurity strategy.

Hackers Backdoor to Microsoft SQL Servers using Trigona ransomware

South Korean cyber security organisation AhnLab has identified a breach in Microsoft SQL servers allowing deployment of Trigona ransomware. The attacks were threat actors using brute-force or dictionary attacks with obtained or guessed credentials to infiltrate externally accessible MS-SQL servers.