Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Backup-as-a-Service using Ondat Snapshots with Cloudcasa

Kubernetes has challenges in managing storage, working out how to make persistent volumes ready for high-scale production workloads, and ensuring the data in those persistent volumes is protected. Watch this short video to see how CloudCasa and Ondat help you free your data and migrate workloads between Kubernetes providers. With a simple snapshot, backup and restore, you are ready to use Kubernetes to deliver the next generation of data intensive solutions for your business.

Secretless, Identity-based Infrastructure Access

Passwords are everywhere. Sometimes they are obvious — hardcoded in the code or laying flat in the file, but other times they take the form of API keys, tokens, cookies, or even second factors. Devs pass them in environment variables, vaults mount them on disk, teams share them over links, and copy them to CI/CD systems and code linters. Eventually, someone leaks, intercepts, or steals them. Because they pose a security risk, there is no other way to say it: passwords in our infrastructure have to go.

Cyber Attack Crisis Simulation & Incident Response | Spotlight on Technology

In this episode of Spotlight on Technology we’re joined by Marie Hargraves, Cyber Workforce Advisor at Immersive Labs, to discuss crisis simulation and incident response testing. What would you do if your organisation was the subject of a cyber attack? Having an incident response procedure is critical, but even if you have one, how can you be sure it will work? How can the process be refined? Marie talks to us about the challenges facing businesses when it comes to incident response, and how these challenges can be overcome to ensure there is a robust plan in place if the worst should happen.