Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Xalient Aruba EdgeConnect

Is your IT checklist growing by the day? Are you struggling to keep up with digital transformation while meeting customer demands for speed, security, and performance? Watch this video and discover how Aruba EdgeConnect SD-WAN can transform your network and security architectures while keeping your business running seamlessly and efficiently around the clock.

The Dark Side of Cybersecurity: Battling Cyber Evil w/ Paul Dwyer

Paul Dwyer, a prominent figure in the world of cybersecurity, delves into the complex and multifaceted realm of cyber threats. Join us as we explore the blurred lines between cyber warfare, cyber terrorism, and cybercrime, all converging into a malevolent force known as cyber evil. Discover the pivotal role of cybersecurity professionals in combating this darkness, relentlessly protecting our digital society from the abyss.

Leveraging Security Asset Inventories

Asset inventories enable you to know what you have to secure, and to monitor it for deviations. The pace of iteration in the world of software engineering makes those platforms inevitable. In this episode we welcome Sacha Faust, director of security engineering at Grammarly, who built Cartography, one of the first open source asset inventory. Sacha describes what led them to building this (funnily: an offensive use case!), how inventories enable spreading ownership to software teams, the solution that exist off the shelf today, …

Trusting your Software Supply Chain Security with DevOps Agility

At RSA 2023, JFrog spoke with security experts about their current challenges and focus areas. With increasing scrutiny on the vulnerability of open-source, and blindspots in their Software Supply Chain (SSC) it was no surprise to hear that SSC attacks have become a top concern. But with so many vulnerabilities to fix, the need for heavy manual efforts, and a plethora of complex AST security tools to navigate, security experts say that securing the SSC can feel like an overwhelming task.

Stopping API attacks with Salt Security and AWS WAF

Every company’s APIs are unique and so are its security gaps. Bad actors will poke and prod to learn your APIs and find mistakes in business logic they can exploit. Catching these attacks requires context and deep behavioral analysis over time. With its recent AWS WAF Ready designation, Salt Security makes it easier and faster for businesses to protect the APIs running in their AWS environments. Salt provides the visibility, intelligence, and context over time to identify and block attacks using tools you already rely on such as Amazon API Gateway, AWS WAF, and other inline enforcement points.

Snyk Hierarchy Best Practices - More than Groups and Orgs

What can startups and large enterprises have in common? Different organizational structures that cause friction when bringing in and rolling out a new tool. If you are familiar with Snyk, you’ll know that Groups can hold many organizations, and Organizations contain Projects. But that does not stop there… Each node in the organizational layer has different reporting, access control as well as security and license policy settings.