Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Welcome to the Cybersecurity Sessions - Podcast Trailer

Cybersecurity Sessions is a concise yet insightful monthly podcast featuring Netacea’s CTO, Andy Still, alongside other technology experts. At Netacea we are interested not just in the technology behind cyber-attacks, but also the intent. How do they affect different businesses, sectors, and even wider society? What stories are out there of cybersecurity woes and wins?

Applying Least Privilege in Kubernetes II Jonathan Canada

Scalability and Cloud-Native have driven the demand for Kubernetes, but the developer now has the harder task of building applications in a secure manner. This talk will focus on best practices for implementing least privilege and enforcing zero trust principles within Kubernetes clusters. A how-to for implementing robust Role Based Access Control (RBAC) tied into the corporate SSO/Identity provider using Teleport.

Secure Delivery

Egnyte’s Secure Delivery ensures only intended recipients have access to shared files and allows you to revoke access even if the recipient previously downloaded those files. When customizing a Share link, select Specific Recipients and enter the desired email addresses. Then, under Allow Downloads, choose Yes, Encrypted. Recipients can view the shared file in their web browser, however, they must install Egnyte FileGuard to open the encrypted file.

Recipient Specific Links

Ensure the files and folders you share from Egnyte are only accessible to your intended recipients, by creating recipient specific links. When creating a Share link, under who will have access, select Specific Recipients and enter the email addresses of the desired parties. The recipients will be authenticated via email when they first access the link. If they access the link again in the future, they will be emailed an authorization code to unlock the shared content.

Activating the GDPR Policy

In just a few clicks, Egnyte locates data that is subject to GDPR so you can take proper action to keep it secure and compliant. The EU and UK General Data Protection Regulations affect any businesses that store personal data, which belongs to a resident of the United Kingdom or European Union. In just a few clicks, Egnyte locates data that is subject to GDPR so you can take proper action to keep it secure and compliant.

Disable Permissions Inheritance

Simple, intuitive & secure collaboration in the cloud. See how you can easily ensure proper access control to folders in your domain with Egnyte’s granular permissions. When adding user permissions to folders, subfolders automatically inherit the permissions of their parent folder. However, you can disable this feature for specific folders to control exactly who has access. From the folder of your choice, select Share, then Manage Folder Permissions.

Tripwire Industrial Cybersecurity Suite

For industrial organizations, managing cybersecurity and compliance is a big job. On top of your IT servers, workstations, applications and databases, etc. you have your plant operations and OT: industrial control systems, SCADA systems, HMIs, etc. Luckily, Tripwire can help you with IT, OT and the convergence of both. From the factory floor, to the top floor, Purdue levels zero through five.

Forward Fix Live: Extending Zero Trust in the Cloud

Trying to make sense of your cloud security posture shouldn't mean flipping between multiple screens and inferring how traffic is behaving. Join this live event to see how you can monitor and verify your security posture across multiple clouds on a single screen.