Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why is Cybersecurity Now a Global Governmental Concern?

Governments everywhere are increasingly concerned about implementing frameworks to improve the protection of personal and commercial information and defend national security against cyberattacks. I was recently in Australia, and it was hard to ignore the news that the Australian government released a discussion paper to shape its work on its 2023 – 2030 cybersecurity strategy.

Hackers Backdoor to Microsoft SQL Servers using Trigona ransomware

South Korean cyber security organisation AhnLab has identified a breach in Microsoft SQL servers allowing deployment of Trigona ransomware. The attacks were threat actors using brute-force or dictionary attacks with obtained or guessed credentials to infiltrate externally accessible MS-SQL servers.
Featured Post

5 best practices for imaging hard drives

Imaging a machine with the relevant OS and disk partitions is the first step involved in OS deployment. You can either image machines that are online with applications running or machines that are shutdown. In this section we will discuss the five best practices to be followed while imaging.

Accelerating Secure Infrastructure Automation with Red Hat Ansible Automation Platform and Styra DAS

I’m excited to announce the launch of Styra Declarative Authorization Service (DAS) and Open Policy Agent (OPA) as a Red Hat Ansible Certified Content Collection. Teams can now automate infrastructure deployments with the right guardrails in place to enable security-enhanced operations and align with regulatory compliance.

Secrets Detection JFrog Security Workshop

In today's software development world, developers rely on numerous secrets, including API keys, credentials, and passwords to facilitate seamless interaction between application components as they code. Failing to remove these secrets can have disastrous consequences for businesses, making it essential to find and fix them before release.

TFiR: Let's Talk! Recovery of Velero Backups to AKS & EKS

Sebastian Glab, Cloud Architect at CloudCasa, shows you how Cloud Casa for Velero allows Velero users to manage their cluster using our software as a service platform. By plugging directly into Velero, CloudCasa provides user friendly, intuitive UI for Kubernetes cluster management utilizing Velero as the backup tool. Users can centrally manage their current backups and configuration across multiple clusters and cloud providers (AKS, EKS and GKE) in one place. They don't have to jump across different environments, access different clusters to see what's going on, they can simply go to Cloud Casa, and manage everything from there. The best part is that Velero users can get all these benefits without worrying about infrastructure management, without causing any disruptions or without having to undergo any migration process.

Introducing GitGuardian Honeytoken

We are proud to introduce you to the GitGuardian Honeytoken module. Honeytokens are decoy credentials that don't allow any real access but instead trigger alerts that reveal the IP address of whoever tried to use them. GitGuardian honeytokens can be used for intrusion detection in your own environments and tools. You can also plant our honeytokens in your SaaS vendors' systems to be alerted if a core vendor in the supply chain has been compromised. Placing honeytokens in your source code help you detect when your code has been leaked publicly, indicating a code leak.

Login with Teleport. Teleport as a SAML Identity Provider

Starting with Teleport 12.1, Teleport Enterprise teams can now use Teleport as a SAML SSO identity provider. This feature allows teams to use Teleport to authenticate to external services, thereby letting teams use SAML SSO to login to external SaaS apps and internal applications that support SAML. Let’s look at a few examples.

Optimizing AppSec by Enhancing Integration with Jira

If there’s one thing we learned in our years of building AppSec technology, it’s that the best tools in the world are useless if they don’t get used. We know from speaking with our customers and industry research that developers won’t use AppSec tools that make their lives harder. Forcing them into cumbersome processes, or making them switch tools and learn a new user interface, will likely lead to AppSec neglect in favor of hitting development deadlines.

A SaaS Multi-Cluster Manager for Velero

Welcome to another video on CloudCasa for Velero: A SaaS Multi-Cluster Manager for Velero backups. In this video, Martin Phan, Field CTO for CloudCasa, will show you the first-hand look of the integration that CloudCasa has with Velero and its centralized GUI that helps users manage and monitor their Velero-based backups. You will find out how CloudCasa for Velero is able to aggregate data across multiple Kubernetes clusters across all hybrid and cloud environments. If you are using Velero today, please check this demo on CloudCasa for Velero and learn more about its multi-cluster management functionality and full stack recovery capabilities using the intuitive GUI.