Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OpenStack Tutorial: How to One-Click Restore OpenStack Workloads with Trilio

Trilio for OpenStack Tutorial - One Click Restore Trilio is the OpenStack-native data backup and recovery solution that gives OpenStack users the ability to restore entire workloads with one click. Trilio helps OpenStack users protect their clouds and efficiently create, store and manage point-in-time backups while providing policy-based recovery times to meet application SLA’s. Trilio is not a third-party legacy solution. It is the OpenStack-native backup service.

AWS in 30 recap

Last month, Lead Partner Solutions Architect, David Schott, presented a demo on how Snyk works alongside Amazon Web Services (AWS) to identify vulnerabilities at every level of development and infrastructure. David covered why agile development in the cloud requires a different security approach than simply using the IT security methods of the past. Then, he showed a real-time example of how Snyk’s AWS cloud security tools can find and mitigate common vulnerabilities.

What is WAAP? - A Quick Walk Through

Many of the businesses that already have revenue-generating web applications are starting an API-first program. Now, old monolithic apps are being broken into microservices developed in elastic and flexible service-mesh architecture. The common question most organizations grapple with is – how to enhance application security designed for web apps to APIs and API security? Protecting APIs against modern cyber threats requires going beyond the traditional solutions.

Coffee Talk with SURGe: The Interview Series featuring Allan Liska

Join Coffee Talk with SURGe for our bi-weekly interview series. This week, SURGe member Shannon Davis interviews Allan Liska, threat intelligence analyst at Recorded Future and author of Ransomware: Understand. Prevent. Recover. They'll talk about the threat of ransomware, including recent trends, the impact of hack-back operations, and how organizations can become more resilient against attacks.

A Snapshot in Time Why Penetration Testing Is Critical for Cybersecurity

When Megan Brown, Jonathan Care, and I explore the world of penetration testing, we uncover the missing links between the testing itself and having a secure organisation and patched vulnerabilities. In this episode, you will learn how to maximise the potential of your penetration tests and increase the depth of your organisation's cyber security.“Pen tests on their own don’t do anything if you don’t have a way of tracking the issues, resolving the issues.”

Hello CISO - Episode 11 - Part 1: Hiring Top Tier Security Professionals

Hiring can be more art than science. What should you look for when hiring security professionals? How important are degrees and certifications, really? In this episode, Troy breaks down how to spot the brightest talent. Hello CISO is a collaboration between Troy Hunt and the people who build the world's most trusted enterprise password manager.

CrowdStrike and Abnormal Security: Better Together

Abnormal Security CEO Evan Reiser and CrowdStrike President Michael Sentonas announce a new strategic technology partnership that integrates the CrowdStrike Falcon platform with the Abnormal platform to offer best-in-class email attack detection and response with endpoint and automated account remediation. Abnormal Security is also a member of the CrowdXDR Alliance, a revolutionary security alliance that delivers unified XDR enterprise-wide.