Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Wallarm Innovation Update: Effective API Protection With GraphQL And API Policy Enforcement

With its exceptional ability to improve application flexibility, performance, and user experience, GraphQL is rapidly becoming one of the most widely adopted API protocols, with Gartner predicting that by 2025 it will be implemented by over 50% of enterprises. However, the same flexibility that makes GraphQL such an attractive protocol, however, also makes it susceptible to a variety of unique attacks.

Is it Possible to See a Full Cloud Inventory in a Single View?

Join networking professionals Mike Lossman and Chris Naish as they discuss how to efficiently manage cloud inventory across AWS, Azure, and GCP cloud platforms using Forward Networks. Keeping tabs on cloud environments can be an arduous process requiring engineers to log into each cloud to gather inventory data. Chris shows how to create a centralized dashboard with Forward Networks, aggregating and filtering information from all three clouds, allowing users to view data like compute instances, VPCs, and subnets in a single location.

What is Lookout Secure Internet Access? A SWG Solution

Lookout Secure Internet Access is a cloud-delivered secure web gateway (SWG) that protects users, networks, and corporate data from internet-based threats. It inspects all incoming and outgoing web traffic for malicious content and sensitive information. Watch this video to learn why you need a modern SWG, how Lookout Secure Internet Access works, and how it can protect your data no matter where it goes.

Following a consistent directory structure in Rego projects with Regal

Using a consistent directory structure for your projects makes them easier to work on. We've added a bunch of functionality to Regal to make following this best practise not just easy but automatic! Our VP of Marketing, William Chia, in a conversation with Senior Developer Advocate Charlie Egan, takes a tour of how the new functionality works.

Dependency Confusion Vulnerability Exposure Protections In GitGuardian SCA

Supply chain security can be a struggle. The GitGuardian Source Composition Analysis module scans your project's dependencies, comparing them against public repos. If it finds any matches between your internal packages and public ones, it flags them as potential dependency confusion risks.

GitGuardian SCA Makes It Easy To Manage SBOMs

GitGuardian SCA makes it easier than ever to build and group your SBOMs while staying up to date with any changes. Our Software Composition Analysis tool, better known as GitGuardian SCA, lets you instantly download up-to-date Software Bills of Material with the touch of a button. No more guessing if things have changed between the last version someone else generated and now. You'll never need to ask your developers to generate a fresh SBOM again.

Why ASPM is the Future of AppSec

ASPM (Application Security Posture Management) is the future of application security. It provides a centralized dashboard that gives security teams visibility into application assets and their relationships. ASPM also prioritizes risk based on context so you can focus on the vulnerabilities that matter most. This video will explore the challenges facing security teams today and how ASPM can help you overcome them.

The Power of Backups: A Key Defense Against Ransomware and Data Breaches #shorts

Backup, backup, backup. That’s the message from Heather Hughes from Aon Cyber Solutions, who emphasizes the crucial role of robust backups in cybersecurity. Effective backups can eliminate the need for a decryptor and ensure business continuity, even when faced with ransomware. Heather highlights that, with strong backups, companies can avoid paying ransoms and focus on assessing potential data exfiltration.

Preparing for Breaches: the Importance of Incident Response Plans and Exercises

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.