Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Experts Monthly Mar23 20230411

Welcome back to the show! In this episode of the Razorwire podcast, I have the pleasure of discussing defence in depth with Razorthorn’s own illustrious consultants, Jamie Hayward and Tom Mills. During our conversation, we talked about the increasing number of tools and solutions available, the perils of ‘reactive’ budget allocation, as well as the changes we’re seeing in the industry and within our clients’ requirements.

What is SOC 2 and how do you achieve SOC 2 compliance for containers and Kubernetes?

SOC 2 is a compliance standard for service organizations, developed by the American Institute of CPAs (AICPA), which specifies how organizations should manage customer data. SOC 2 is based on five overarching Trust Services Criteria (TSC): security, availability, processing integrity, confidentiality, and privacy. Specifically, the security criteria are broken down into nine sections called common criteria (CC).

Arctic Wolf Recognized as Top MDR Solution by G2

It’s good to be on top. G2 has recognized Arctic Wolf® Managed Detection and Response (MDR) as the top overall MDR solution. As the leader in security operations, we help thousands of organizations across industries and around the globe end cyber risk through 24×7 monitoring that helps organizations detect, respond, and recover from modern cyber attacks. It’s an honor to be recognized by G2.

ChatGPT's Role in the Evolution of Application Development

When I wrote my first applications in high school, coding was a lot more time-consuming. I didn’t have libraries I could shop through with ready-made bits of code to drop in to save myself time or bridge the gap between the pieces of code I could write to create something more complex. Instead, I had to write everything from scratch. If I wanted to include any kind of image, I would have to draw it with mathematical coordinates, which took a ton of time.

30 Ransomware Prevention Tips

Dealing with the aftermath of ransomware attacks is like Russian roulette. Submitting the ransom might seem like it’s the sole option for recovering locked data. Ransomware also continues to evolve as a threat category within the past year, with old names like REvil rearing their heads and new players like Black Basta emerging in 2022.

Explaining the Importance of Netskope's Recent Expansion of NewEdge in the UK

Over the past few weeks, our UK team has been very excited about the expansion of our NewEdge infrastructure, specifically the addition of a new data centre in London. Knowing that this was the fourth data centre in the UK, I cornered our EMEA CISO Neil Thacker, and our new UK public sector lead Tim Parkins, to find out what all the fuss was about.

Over 10,000 Students Hit By Hawaii Maui College Data Breach

The University of Hawaii Maui College is one of ten branches of the Hawaii public university college system. The school is located in Maui and serves more than 2,500 students annually. This public university is one of many that recently suffered from a data breach exposing students to possible identity theft risks.

Identify vulnerabilities in your container images with Snyk's enhanced Docker Desktop Extension

The Docker developer ecosystem is continuously growing, and container security is becoming even more important as the Docker developer ecosystem evolves. The developer-friendly Snyk security integration with Docker is invaluable in today’s landscape. Snyk has made significant updates to the Docker Desktop Extension and continues to evolve the extension to ensure the applications and images pushed to the container registry don't have critical vulnerabilities.

Staying ahead of Privileged Access Management security risks: Success strategies

Privileged accounts are the root of most threat vectors. So, it’s critical to take proper precautions to prevent catastrophic breaches. However, it often takes extra time and effort to fully recognize and mitigate Privileged Access Management security risks that put your organization at risk.