Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Eliminate compromised passwords with One Identity Password Manager & Have I Been Pwned

It's a good question, and if you're curious about whether any of your email addresses or passwords were included in a data breach, you can easily find out at HaveIBeenPwned.com. This entirely free service, managed by Microsoft Regional Director & MVP Troy Hunt, lets you enter an email address or password to see how many breaches it has been included in.

Protecting Financial Data: Best Practices for External Attack Surface Management

The threat landscape in the financial services sector continues to get more menacing. Malicious actors and cybercrime groups increasingly set their sights on the sensitive financial data that banks, moneylenders, insurance companies, credit unions, and more all store in their IT environments. Exemplifying the challenge, one recent study found that the financial sector experienced the second-highest volume of data breaches in 2022.

How to - Disaster Recovery of a MineCraft Server on Red Hat OpenShift with Trilio

In this Video our Senior Solution Architect Rodolfo Casas is demonstrating how easy e.g. a MineCraft Server can be disaster recovered from one OpenShift Cluster to another. In this case we are talking about a DR scenario from ROSA (Red Hat OpenShift on AWS) to ARO (Azure Red Hat OpenShift Service)

Unified API Protection: What It Is & How It Helps Secure API Landscape

Application Programming Interfaces (APIs) are the connecting tissue that enables the communication between applications, internal and external, and facilitate data exchange on a massive scale. In a world where information is the crown jewel of an organization, APIs are driving the delivery of digital services to customers and partners. While their usage is already exploding, the growing popularity of cloud-native technologies and microservices has only accelerated API adoption.

Sleepless Nights Due to Malware

This podcast is hosted by Venkatesh Sundar, founder at Indusface, with our guest Kashish Jajodia CTO at Draup. Kashish learned the importance of #cyber #security from an interesting experience, which led him to build a robust SaaS application that supports some multi-million dollar customers 🧳. In this session, Kashish talks to Venky about how he looks at vulnerability assessment, penetration testing, and application security. What drives Draup to look at application security? Is it for building trust with their customers or compliance needs?

Cyber Insurance for SaaS Companies

In this session, Sangmesh Hiremath (Founder Marmin.AI) talks to Venky about how cybersecurity is a crucial driver for their business to expand and grow in Saudi Arabia, the Middle East, and European markets. He shares the steps one can take to comply for business in a country and meet cybersecurity compliance for qualifying for a contract 📄. For any SaaS business that wishes to expand its presence in the above-said markets, an investment of 20mins on this podcast can help you save three months of research on AppSec and Compliance.🔐

Complying with the National Cybersecurity Authority Regulations

In this session, Sangmesh Hiremath (Founder Marmin.AI) talks to Venky about how cybersecurity is a crucial driver for their business to expand and grow in Saudi Arabia, the Middle East, and European markets. He shares the steps one can take to comply for business in a country and meet cybersecurity compliance for qualifying for a contract 📄. For any SaaS business that wishes to expand its presence in the above-said markets, an investment of 20mins on this podcast can help you save three months of research on AppSec and Compliance.🔐

Understanding Direct Cloud Connectivity: Jargon and Benefits

Direct cloud connectivity refers to a natural, dedicated connection between a user's on-premises infrastructure and a cloud service provider's network. It bypasses the public internet and provides a secure and private connection with lower latency and higher bandwidth than traditional internet-based connections. Direct cloud connectivity enables organizations to move large amounts of data, applications, and workloads to the cloud with improved performance, security, and reliability.

Five worthy reads: Why should we worry about cyberwarfare in 2023?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll explain why cyberwarfare could be a potential cyberthreat in 2023. Cyberwarfare was one of the top trending terms in 2022, and the incidents that happened last year have opened up more discussions regarding this topic. Most people think cyberwarfare is synonymous with the term cyberwar.

Ultimate Security Checklist to Launch a Mobile App in UAE - iOS & Android

Launching a mobile application in the UAE? Prepare to navigate through an intricate web of laws and regulations. The Emirates' governmental framework is renowned for its unwavering adherence to data privacy, making it essential that businesses ensure compliance when dealing with customer information online.