Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Enhancing CISO-Board communication: Three key questions for the CISO to answer

A challenging dynamic exists between the CISO and the Board of Directors. While both stakeholders focus on risk management, their approaches to risk and the language they use are notably different. Though regulations like the NIS2 directive and SEC cybersecurity disclosure rules have given CISOs a bigger seat at the table, the legal requirements and operational prioritization to meet them have exposed a difference in perspective and understanding between the two roles.

What's New in Calico Cloud Summer 2024 Release

In the rapidly evolving world of container security, staying ahead of threats and keeping abreast of vulnerabilities is crucial. Calico Cloud continues to lead the way with new capabilities designed to enhance security posture, reduce noise, and improve operational efficiency for Security and DevOps teams. Here’s a comprehensive look at how these enhancements can impact your security posture and streamline your operations.

On-Prem and Kubernetes: A delicate relationship

In cloud security, context is everything. In the previous two installments of our Customers Care Chronicles, we wrote about how a security vendor needs to be a true business partner and the potential headaches when migrating tools in the cloud. In this installment, we tackle another non-security concept that happens to be crucial for security: environment.

Why identities are the new perimeter in the cloud

In the ever-expanding world of cloud computing, one thing has become glaringly clear: identities are no longer just user profiles—they are the keys to the kingdom. As businesses race to harness the power of the cloud, they must also confront a growing menace: the risk posed by poorly managed identities. Imagine leaving your front door unlocked in a neighborhood known for break-ins — that’s what weak identity management is like in the cloud.

Cloud identity insights - Detect at the edge in real time

Cloud attacks strike fast. Prevention used to be enough, but not anymore. And legacy EDR tools fall short because they lack visibility into cloud identities and behavior. Defenders need the ability to detect at the edge - in real time - and correlate early stage identity behavior to see what's happening fast.

Sysdig's AI Workload Security: The risks of rapid AI adoption

The buzz around artificial intelligence (AI) is showing no sign of slowing down any time soon. The introduction of Large Language Models (LLMs) has brought about unprecedented advancements and utility across various industries. However, with this progress comes a set of well-known but often overlooked security risks for the organizations who are deploying these public, consumer-facing LLM applications.

Advantages of Calico's DNS Policy Implementation over Cilium's DNS Policy Implementation

DNS policies play a critical role in managing and securing workload communication for cloud-native applications running on Kubernetes clusters. Two popular options for implementing DNS policies are Calico and Cilium. While both have their merits, Calico’s approach offers several distinct advantages over Cilium’s, particularly in terms of flexibility, scalability, and overall operational simplicity.

Code Lens Evaluation with Regal and the OPA VS Code extension

Our VP of Marketing, William Chia, in a conversation with our DevRel lead Anders Eknert about the new Code Lens Evaluation feature that just landed in Regal. A conversation that quickly turns into a demo! Watch to see how the feedback loop of Rego development now is shorter than ever, and will change the way you author your policies. Rego development experience taken to a whole new level!