Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Protecting your Windows Fleet with Zero Trust

In today's increasingly remote-first business landscape, secure and efficient access to Windows desktops and servers has become more crucial than ever. Join us in this illuminating webinar as we navigate the evolving patterns and practices of remote access, and how to optimally safeguard your Windows Servers. We will spotlight common access patterns, detailing the do's and don'ts for ensuring secure access.

Malicious Packages Special Report Overview

Malicious Packages: A Growing Threat to the Software Supply Chain The global economy runs on software applications, and their function and security are critical to every company’s success. Many applications have exploitable vulnerabilities that modern defenders struggle to effectively detect and remediate. In addition to the growing number of vulnerabilities, today’s security teams face the emerging challenge of malicious packages.

Kubelet vulnerabilities on Windows nodes: CVE-2023-3676, CVE-2023-3955 and CVE-2023-3893

Recently, the Kubernetes Security Response Committee disclosed three interrelated vulnerabilities affecting the Windows versions of Kubelet and the Kubernetes CSI proxy. These vulnerabilities pose a significant risk, allowing even users with limited permissions to escalate their privileges to administrator level on affected nodes.

Protecting And Recovering Cloud Load Balancers

Unlike other cloud providers that offer their own closed source backup services, AWS EKS simply recommends using open source tool, Velero. However, as one of the first companies to fully integrate with AWS EKS, CloudCasa saw a gap in the market, enabling users to still leverage the power of open source with Velero while offering a SaaS management solution for enterprises that aimed to simplify the backup process.

Five Key Application Security Best Practices and Benefits for Maintaining Up-to-Date Dependencies

We’re using more code, software components, and dependencies than ever before, making security breaches an ever-growing threat. It’s easy for developers and DevOps teams to neglect dependency updates when faced with such high volume, but doing so allows applications to fall behind the latest versions if not properly managed. This typically leaves applications using outdated dependencies, which exposes them to ever-increasing security debt and risk.

Securing Kubernetes in multi-cloud environments: challenges and best practices

Kubernetes has become the de facto platform for orchestrating containerized applications at scale in today’s IT landscape. Its ability to run on various platforms including on-premises, public cloud, and hybrid has made it an essential tool for many organizations. This is particularly true for companies following a multi-cloud strategy, relying on more than one vendor for their cloud computing needs.