Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is Cybersecurity Smart Enough to Protect Automated Buildings?

Imagine that you are in an elevator in a high rise building when suddenly the elevator starts to plummet with no apparent stopping mechanism other than the concrete foundation below. While this may sound like something from a Hollywood movie, consider the idea that a securely tethered, fully functional elevator is as vulnerable as it is smart.

Foresight Mental Health is changing mental health care for the better with DLP in mind

Industry: Healthcare Employees: 244 HQ Location: San Diego, CA Keely Strong, Director of Operations Complex problems, like delivering high quality mental health services during a pandemic, require creative thinking. Foresight Mental Health began at the intersection of ingenuity and necessity: changing the way people interact with and think about mental health care by creating accessibility through the use of insurance plans and increasing provider availability.

Peace out this holiday season by securing every transaction against card-not-present fraud

We are about to enter the most wonderful time of the year. As consumers increasingly turn towards online and mobile commerce, are you confident in your card-not-present fraud detection capabilities? 2020 has been a year of great surprise and change. While the global health pandemic has changed how we physically interact with each other, it has also revolutionized how we shop.

The Future of Ransomware: Preparing for the Next Generation of Ransomware Attacks

Ransomware has been the scourge of cybersecurity and may have led to a recent death. Now it soon may get way more dangerous The threats to cybersecurity are constantly evolving. As security teams develop solutions to the threats, malicious actors change their tactics to keep chasing their ill gotten gains. After all, the Game is the Game. And the game keeps changing. In recent years, ransomware has been the weapon of choice for hackers looking for a payday.

Secure your infrastructure in real time with Datadog Runtime Security

From containerized workloads to microservice architectures, developers are rapidly adopting new technology that allows organizations to scale their products at unprecedented rates. In order to make sense of these complex deployments, many teams are abstracting applications away from the environments in which they run. Because of this trade-off, developers and security teams lose the access to the unified context from infrastructure to application needed to fully secure their services.

Data Protection in the Age of Kubernetes

Software containers are at the heart of cloud-native business transformation initiatives. Containers are a natural evolution from virtual machines to a more granular and portable application environment in clouds. They are designed to support rapid development and deployment of cloud-native applications in what is called a DevOps model, a set of practices that combines software development and IT operations.

Demo: Using Netskope policies to deliver Okta authenticated access to any cloud application

When Okta is integrated with Netskope's Next Generation Secure Web Gateway (NG SWG) it becomes possible to apply strong authentication to any cloud application. This demo shows how Netskope can challenge a user for Okta authentication when they attempt to access an unmanaged cloud application.

Demo: Using Netskope policies to deliver Okta authentication challenges based on risky user behavior

When Okta is integrated with Netskope's Next Generation Secure Web Gateway (NG SWG) it becomes possible to challenge users for authentication when they perform risky activities. In this example, the uploading of sensitive data to a cloud application will trigger an authentication challenge before allowing the activity to complete.