Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Security Service Edge (SSE)

What is Security Service Edge (SSE)? Why are legacy security architectures no longer effective? Clear up the confusion and learn about this emerging category that helps improve user experience and security with help from Netskope's Vice President and Chief Evangelist, Bob Gilbert. Intelligent SSE from Netskope is redefining cloud, network, data security.

Cybersecurity Awareness Month: Recognize and Report Phishing

While phishing attacks are nothing new, the methods used to execute them are constantly evolving. Today, hackers are taking advantage of automation and other advanced techniques to increase the scale of phishing campaigns and better target victims. In this video, we dive into the importance of recognizing and reporting phishing attempts.

Shining a Light on Bots (From 'Phishy Business') | Cybersecurity Sessions bonus episode

Bonus episode: Cybersecurity Sessions host Cyril Noel-Tagoe was recently featured on the Mimecast podcast series Phishy Business. Cyril joined hosts Alice Jeffery and Brian Pinnock, plus fellow guest, Mimecast Senior Product Manager Dr Kiri Addison, for a fascinating conversation about bots and what they are used for (both good and bad). About Phishy Business

Stranger Danger: Your Java Attack Surface Just Got Bigger

Building Java applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome, you're a cloud native application developer! As developers, our responsibility broadened, and more software means more software security concerns for us to address.

User Office Hours | How to Secure CI/CD Pipeline w/ GitHub Actions & Snyk | Mar 23, 2022

This User Office Hours session covers how to build a secure CI/CD Pipeline with GitHub Actions and Snyk. First, we'll build a demo application. Then, we'll walk through how to test for security issues using Snyk Open Source and Snyk Code. We'll then go on to deploy a container image. Missed the live stream? Feel free to ask questions in the comment section, and we'll do our very best to answer them.

State of Zero Trust adoption in Australia

Zero Trust, a phrase coined by Forrester in 2009, is not a commonly used cybersecurity strategy in Australia and the Asia-Pacific region. In the United States, large technology companies and the federal government have been eager to adopt Zero Trust. But in Australia and New Zealand, Zero Trust adoption has been prolonged. People were confused about what Zero Trust means.