Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Implement NIST cybersecurity framework with Calico to reduce security risks in Kubernetes environments

According to the CNCF annual survey released in 2022, 96% of organizations are using or evaluating Kubernetes as a platform for their containerized workloads. Containerization has gained popularity as it fosters DevOps culture and provides the agility and flexibility required for faster software release cycles. Kubernetes has crossed the “adoption chasm” to become a mainstream global technology, emerging as the operating system for the cloud.

Moving From Awareness to Action: Living the 4 Themes Cyber Security Awareness Month 2023

October is nearly over, and with it the 20th annual Cybersecurity Awareness Month is coming to a close. As it does, let’s take a moment to review this month’s key themes and provide insight on how to implement any themes that might still be open to-dos.

What is the Probability of a Data Breach?

Cybercrime is on the rise. By 2025, the cost of cybercrime around the world is estimated to escalate to $10.5 trillion, based on a year-over-year increase of 15%. This number represents the potential for the largest transfer of economic wealth in history and exceeds even the total global profits from the illegal drug trade.

City of Philadelphia Announces Hack, Potentially Exposing City Emails

Philly is the most populous city in the United States, hosting more than 1.5 million residents within its borders. The City employs around 30,000 people, fulfilling over 1,000 job categories. Recently, the City discovered suspicious activity within its email system, leading to potential information exposures of those with accessible accounts. If you have a city email account, your information could be at risk for misuse.

The Crucial Link, part two

In my last post, I highlighted what organisations can and should do to improve their cyber resilience. Not only will this help them obtain cyber insurance, but it will also help them retain it as well. Another way to improve your ability to meet cyber insurers’ qualification standards is to leverage outside help through managed service provider (MSP) partnerships.

Detect Secrets In Docker Images With ggshield - The GitGuardian CLI

Did you know that you can use ggshield to scan docker images for secrets? Many Docker images get shared through places like Dockerhub, and sometimes, images get shared unexpectedly, such as when you have a code leak. We built the `ggshield secret scan docker` command to help. With one simple command, anyone on your team can quickly detect any hardcoded credentials inside a docker image.

5 Types of Firewalls for Enhanced Network Security

Firewalls form the first line of defense against intrusive hackers trying to infiltrate internal networks and steal sensitive data. They act as a barrier between networks, clearly defining the perimeters of each. The earliest generation of packet-filter firewalls were rudimentary compared to today’s next-generation firewalls, but cybercrime threats were also less sophisticated. Since then, cybersecurity vendors have added new security features to firewalls in response to emerging cyber threats.

The Application Migration Checklist (Updated for 2024)

All organizations eventually inherit outdated technology infrastructure. As new technology becomes available, old apps and services become increasingly expensive to maintain. That expense can come in a variety of forms: Cloud computing is one of the most significant developments of the past decade. Organizations are increasingly moving their legacy IT assets to new environments hosted on cloud services like Amazon Web Services or Microsoft Azure.

12 Best Network Security Audit Tools + Key Features

Fortified network security requires getting a variety of systems and platforms to work together. Security teams need to scan for potential threats, look for new vulnerabilities in the network, and install software patches in order to keep these different parts working smoothly. While small organizations with dedicated cybersecurity teams may process these tasks manually at first, growing audit demands will quickly outpace their capabilities.

[Cybersecurity Awareness Month] Enchantments Against Spear Phishing By Breachatrix le Phish

In the mystical realm of cyberspace, where digital forests hold secrets and virtual owls deliver messages, we find ourselves in a constant dance between magic and deception. Today, KnowBe4's Security Awareness Advocate Anna Collard will unveil the secrets of spear phishing.