Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Five Tips for Using SBOMs to Boost Supply Chain Security

A Software Bill of Materials (SBOM) is a key cyber defense item — it identifies what’s in your software, applications, and code base so that you can detect and mitigate risk more effectively. This is useful when it comes to application security because companies can only detect and fix vulnerabilities if they know what’s there in the first place. SBOMs give you that visibility. Consequently, SBOMs are now a “must-have” tool for most companies.

ARMO achieves SOC 2 certification: strengthening security and trust

We are thrilled to announce that ARMO, the makers of Kubescape and ARMO Platform, has successfully obtained the SOC 2 certification. This achievement underscores ARMO’s unwavering commitment to maintaining the highest standards of security, privacy, and operational excellence for its customers and users. With the SOC 2 certification, ARMO demonstrates its dedication to safeguarding customer data and fortifying trust in its platform.

Securing CI/CD pipelines with 1Password Service Accounts

Attention developers and DevOps teams! Today we’re excited to announce that 1Password Service Accounts are now generally available to all users. Whether you’re a growing startup, a thriving mid-size company, or a sprawling enterprise, service accounts offer a secure, automated way to access infrastructure secrets exactly where they’re needed.

What is Security as Code and How to Get Started Implementing it

Modern companies are rapidly adopting cloud applications and services due to scalability, cost savings, and faster time to market. DevOps teams and developers must deliver fast, secure code while protecting secrets and log files, creating a growing concern over the security risks of this digital transformation. According to a recent report, more organizations are adopting security as code (SaC) practices, with 62% of respondents citing it as a priority.

CloudCasa Is Making It Easy To Use Velero | Ryan Kaw At KubeCon+CloudNativeCon

Ryan Kaw, Vice President of Global Sales at CloudCasa by Catalogic, joined Swapnil Bhartiya, Founder and Editor-in-Chief of TFiR, at KubeCon + CloudNativeCon EU to deep dive into the availability of CloudCasa for Velero, which addresses problems around multi-cluster management, alerting and reporting, and provides enhanced recovery capabilities through a new user interface. CloudCasa recognizes that a lot of people are already using Velero in their environments, so the company decided to meet them where they are. The solution is compatible and complementary to Velero and the integration is non-disruptive.

Trust And Community Collaboration Drive Open Source Adoption In The Cloud

CloudCasa by Catalogic is a cloud-native backup service that protects Kubernetes and cloud-native data. In this episode of TFiR: T3M, Swapnil Bhartiya sits down with Sathya Sankaran, Chief Operating Officer at CloudCasa by Catalogic, to talk about the factors driving open-source adoption and the role CloudCasa by Catalogic is playing in the open-source ecosystem.

Top 10 Questions About the Apache License

According to Mend.io research, the Apache 2.0 license is the most popular license of its kind, as 30% of open source licenses currently in use is Apache. Owing to its frequent use, it’s important to understand how the license works, its benefits, limitations, implications, and requirements. To help you, here are ten frequently asked questions about it.

NTLM v1 and v2 vs Kerberos

NTLM V1 and V2, and Kerberos are three authentication protocols. These protocols aim to enhance security, especially in the Active Directory environment. Authentication protocols are popular attack vectors. They can help attackers gain access and elevate privileges. It is important to choose the relevant and most secured protocol for your environments and configure it properly. The most veteran protocol among the three is NTLMv1.

RDP: Do Not Allow COM Port Redirection- The Policy Expert

Do not allow COM port redirection in RDP is the name of a security setting stated in Windows servers CIS benchmarks/STIGs. A COM port is an I/O interface that enables the connection of a serial device to a computer. In some cases COM ports are called “serial ports”. Most computers are not equipped with COM ports anymore but there are many serial port devices still used in computer networks.