Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Enable GitOps for Kubernetes Security - Part 1

“How do I enable GitOps for my network policies?” That is a common question we hear from security teams. Getting started with Kubernetes is relatively simple, but moving production workloads to Kubernetes requires alignment from all stakeholders – developers, platform engineering, network engineering, security. Most security teams already have a high-level security blueprint for their data centers.

Are you dealing with the symptoms or the cause of analyst burnout?

Organizations build a SOC – a dedicated, centralized team of security experts – to effectively detect and respond to advanced threats. However, as SOCs deal with evolving threats and an expanding attack surface, advancements in the stack have not kept pace and analysts are feeling the pain.

Data Governance....at the heart of security, privacy, and risk

Security, privacy, and risk does not have to be scary… but with GDPR, CCPA, and organizations moving to a risk-based approach to security rather than focusing on only compliance, it has become a daunting challenge. What is typically at the heart of organizations? Data and information. The common denominator that makes security, privacy and risk more effective and dare I say, easier?….data governance.

What Is IP Attribution, and Why Is It Doomed?

Internet Protocol (IP) attribution is the attempt to identify a device ID or individual responsible for a cyber attack (e.g. ransomware or other types of malware) based on the origin of a network packet. An IP address is given to a system for a period of time that enables them to exchange data to and from other devices on networks.

Is the Electric Grid Ready to Respond to Increased Cyber Threats?

Reports from the U.S. Government Accountability Office (GAO) and Siemens highlight both the increasing cyber threats faced by the electric utility companies and the lack of adequate readiness to respond to these threats. According to these reports, a cyber-attack on the electric grid could cause “severe” damage.

Guide to Container Security - Everything You Need to Know

Ah, the wonders of technology. In the innovation-rich Information Age, we are the beneficiaries of a nonstop wave of new advancements, each offering the ability to execute vital tasks faster and more efficiently than ever before. However, along with each breakthrough comes potential security vulnerabilities.

Cyber Attack Risk Climbs in Latest WEF Regional Risk Report

Unsurprisingly, cyber attacks are growing in the business sector and not just in the United States but world-wide. Cyber-attacks represent the greatest risk in six out of ten of the top economies in the world. The report presented by the World Economic Forum discusses formjacking, cryptojacking, ransomware like LockerGoga and other cyber-attacks of which CEOs around the globe are starting to become more aware.

Collaboration in the modern biotech era

The life sciences industry has rapidly changed over the past twenty years. Drug development, historically, used to rely on vertically-integrated institutions that spanned scientific functions. However, today, products are launched by emerging startups, vast companies and any size in between. To improve velocity and agility, research is increasingly outsourced to academia and external partnerships beyond the traditional confines of a company.