Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Guarding Against Work-From-Home Phishing Threats

By this stage, everyone is familiar with the phrase ‘social distancing’ and what it means with regards to shopping trips and exercise outdoors. Social distancing, as we all know by now, was introduced to slow down or, more hopefully, stop the spread of Coronavirus. Many companies are taking steps to enable as many people as possible to work from home.

Solid Infrastructure Security without Slowing Down Developers

In this post, I want to share my observations of how SaaS companies approach the trade-off between having solid cloud infrastructure security and pissing off their own engineers by overdoing it. Security is annoying. Life could be much easier if security did not get in the way of getting things done.

What is Attack Surface Management?

Attack surface management (ASM) is the continuous discovery, inventory, classification, prioritization, and security monitoring of external digital assets that contain, transmit, or process sensitive data. In short, it is everything outside of the firewall that attackers can and will discover as they research the threat landscape for vulnerable organizations.

How to Implement Network Policy in Amazon EKS to Secure Your Cluster

By default, pods are non-isolated; they accept traffic from any source. The Amazon EKS solution to this security concern is Network Policy that lets developers control network access to their services. Amazon EKS comes configured with Network Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network policy and a live demo implementing each use case.

How to Implement Network Policy in Azure AKS to Secure Your Cluster

By default, pods are non-isolated; they accept traffic from any source. The Azure AKS solution to this security concern is Network Policy that lets developers control network access to their services. The Azure AKS comes configured with Network Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network policy and a live demo implementing each use case.

Security And Compliance for Remote Federal Workers

With much of the federal workforce now using laptops to work from home, how can agencies like yours overcome VPN hurdles and ensure the same standard of security monitoring? Compliance frameworks help you achieve and maintain remote asset security with detailed, step-by-step guidance on best practices, including extending security controls to cover remote laptops and other endpoints employees may be using from home in the wake of Covid-19.

The MITRE ATT&CK Framework: Discovery

The Discovery tactic is one which is difficult to defend against. It has a lot of similarities to the Reconnaissance stage of the Lockheed Martin Cyber Kill Chain. There are certain aspects of an organization which need to be exposed in order to operate a business. What is the MITRE ATT&CK™ Framework? - YouTube An error occurred. Try watching this video on www.youtube.com, or enable JavaScript if it is disabled in your browser.

How to Do Endpoint Detection and Response with SOAR?

Ensuring business continuity is the top priority of every organization. However, is it possible in the age of digital warfare? Today, businesses are at great risk from state-sponsored attacks, insider threats, external threats, organized crimes, and threats from hacktivists. Advanced Persistent Threats (APTs) including all types of viruses are sophisticated and fast and protecting endpoints has become a great challenge for enterprises.