Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Between Two Cones | Mitigating Construction Project Risks with CCPI

In this video, CPPI’s Director of Technology, Brad Buckles, and Egnyte’s Senior Manager of AEC, Nick Decker, discuss mitigating risk in construction projects. Brad outlines his three pillars of risk management: safety, scheduling, and financial, and the tools, techniques, and proactive steps that CPPI takes to reduce their exposure and impact. Between Two Cones is a recurring leadership series featuring AEC experts speaking on the latest trends and most significant challenges the industry faces. Whether you’re a seasoned professional or new to the industry, there is something for everyone.

Securing the digital supply chain Ep 7 Yaser M

Yaser is a veteran in the construction industry and in this session we learn about what technologies are used in the construction technology sector, what are some of the gotchas that industry leaders should pay attention to and the various types of organizations that are there on the landscape..

What Is Cyber Hygiene?

The hackers succeed because they know your attack surface better than you do. - Rob Joyce. For example, a lot of times, companies spin up a QA server and then forget about it, which then becomes an easy target for hackers to break into the company. Companies need to maintain a good cyber hygiene by taking care of the basics. An example of a bad cyber hygiene is a website that shows Copyright 2010 in 2022.

Create an API Specification Scan

Traditionally Veracode Dynamic Analysis has targeted applications with a Web user interface. But increasingly, web applications are composed of many small microservices, many of which have Representational State Transfer (REST) interfaces with which the UI layer communicates. With API scanning, you can now scan the APIs of your microservices earlier in the software development process, before they are integrated into a web application.

Digital Prepping - Why It Pays To Be Prepared

Prepping is a way of life for people all across the world - it's the practice of making active preparations for a possible catastrophic disaster or emergency, typically by stockpiling food, ammunition and other supplies. Digital prepping however, is ensuring you, your networks, data and digital assets are ready for the very real possibility of a potential future cyber attack. So... are YOU ready?

Coralogix - On-Demand Webinar: Achieving Scale and Compliance During a Global Expansion

Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. With a hybrid environment of both single and multi-tenant infrastructures generating massive amounts of data, the team needed a powerful solution to centralize and manage their log data. In this session, Armis’s Head of DevInfra Roi Amitay discusses how his team leverages Coralogix’s unique capabilities together with custom-built dev tools to streamline the development and debugging of microservices on multiple EKS clusters.