Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing private applications with CrowdStrike Zero Trust Assessment and AWS Verified Access

CrowdStrike Zero Trust Assessment (CrowdStrike ZTA) provides customers the ability to assess their endpoint security posture, allowing AWS Verified Access to provide conditional access to resources that comply with their organization’s device posture policies.

A SaaS Multi-Cluster Manager for Velero

Welcome to another video on CloudCasa for Velero: A SaaS Multi-Cluster Manager for Velero backups. In this video, Martin Phan, Field CTO for CloudCasa, will show you the first-hand look of the integration that CloudCasa has with Velero and its centralized GUI that helps users manage and monitor their Velero-based backups. You will find out how CloudCasa for Velero is able to aggregate data across multiple Kubernetes clusters across all hybrid and cloud environments. If you are using Velero today, please check this demo on CloudCasa for Velero and learn more about its multi-cluster management functionality and full stack recovery capabilities using the intuitive GUI.

Ad-Hoc Job Runs and Creating backup and Restore Custom Resources for Velero

Welcome to another video on CloudCasa for Velero, in which Martin Phan, Field CTO for CloudCasa, will show you how you can easily form Ad hoc job runs for Velero in CloudCasa. He will also demonstrate how you can create backup and restore Custom Resources in CloudCasa for Velero and get notifications directly from the CloudCasa service that is running within Velero. Through functionality already native to CloudCasa such as full stack recovery, email alerting and role-based access control, CloudCasa for Velero can be that single pane of glass to manage and report on all your Velero installations throughout your enterprise. So do give CloudCasa for Velero a try and do let us know what you think.

The 443 Podcast, Ep. 236 - Another Software Supply Chain Attack

This week on The 443, Corey Nachreiner and Marc Laliberte discuss the latest software supply chain attack with a potential blast radius of thousands of organizations. They then cover a new protocol vulnerability in the Wi-Fi wireless standard before ending with some research into insecure Microsoft Azure applications.