Open Policy Agent with Kubernetes - Tutorial (Pt. 1)
Let's get our hands dirty with policy as code and write our first OPA policies for a Kubernetes environment.
Let's get our hands dirty with policy as code and write our first OPA policies for a Kubernetes environment.
In today’s society, social media has become a prevalent method of communication and sharing the highlights of our daily lives has become the norm. Unfortunately, there are many risks associated with oversharing in the digital world. Oversharing can be especially dangerous because of the tendency to expose sensitive information which jeopardizes your privacy and security.
The holidays are here, and it’s the time of year when we all want to be on the “Nice List” While this is an enjoyable time of year for gift giving and gift receiving, it’s essential to do everything possible to stay on your CSO’s nice list. No one wants a cybersecurity lump of coal! Ensuring you’re on the nice list and not the naughty list can come down to a few simple tasks that keep your security in a safe space.
When talking about big influences on cybersecurity, we tend to think about sweeping trends like digital transformation and the hybrid work revolution. And that makes sense. Cloud adoption, for example, has created complex corporate infrastructures. This is forcing the security industry to rethink how they protect data.
As organizations are increasingly prioritizing application security continues to become a top priority for organizations, application security risk assessments is atop many bucket lists. Every application is unique and carries threats factors. It's critical to implement processes and tools to identify and remediate security issues before shipping.
Security teams have more data about their attack surfaces than ever before. Today, Detectify continuously monitors over 3 million domains (up from 700k around this time last year). As the attack surface grows, so does that amount of data that security teams have to manage. And security teams are feeling the pinch. We’re excited to announce Groups, a more intuitive approach to grouping assets across your attack surface.
New custom webhooks are now available to help you orchestrate your incident remediation workflows and processes outside of your GitGuardian Internal Monitoring workspace!
As Christmas approaches, many of you will be winding down and preparing for the festivities – unfortunately, cyber criminals notoriously take advantage of the holiday season, coercing their way into our digital spaces and cashing in on the season of giving. With this in mind, here are our cloud and security experts 12 top-tips, to ensure that your business and workforce, stay one step ahead of the hackers.