Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CNCF Webinar: Getting started with container runtime security using Falco

Protect Kubernetes? As Kubernetes matures, security is becoming an important concern for both developers and operators. In this talk, Loris Degioanni (CTO and Founder @Sysdig) will give an overview of cloud native security, discuss its different aspects, with particular focus on runtime, and explain what inspired the development of Falco, the CNCF container security project. Through demonstration, he will educate the CNCF community on the ways Falco is being used for real-world workloads. Lastly, he will share the latest on Falco’s adoption, maturation within CNCF and what’s on the horizon.

Kubernetes Security

Containers and Kubernetes have revolutionized the way many teams deploy applications. But with the many benefits that these technologies provide come new challenges. Key among those challenges is security. By adding more layers and complexity to application environments, containers and Kubernetes create new opportunities for attackers and new security threats for Kubernetes admins to address.

Bitbucket vs GitHub [Updated for 2020]

If you boil it down to the most basic difference between GitHub and Bitbucket, it is that GitHub is focused around public code and Bitbucket is for private. GitHub has a huge open-source community and Bitbucket tends to have mostly enterprise and business users. Bitbucket vs Github: Two of the largest source code management services for development projects, offering a variety of deployment models from fully cloud-based to on-premise. Historically, they have taken different approaches to private vs.

Ransom Payments Could Result in Civil Penalties for Ransomware Victims

Victims of ransomware attacks could potentially receive civil penalties for making ransom payments to a growing list of threat actors. On October 1, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) revealed that it could choose to impose civil penalties on ransomware victims who make ransom payments to malicious actors whom it has designated under its cyber-related sanctions program.

Securely Growing Sales with Egnyte and Salesforce

When a company was directed by its board to grow revenue, the sales process badly needed to be improved. Hiring new sales staff simply is not enough, and rarely cost-effective. Confronted with this big task, sales teams and IT teams look for a solution that works with their existing ecosystem of tools. While seeking to revamp his sales processes, there are so many options, many companies don’t know where to start.

Industry Watch: How the Pandemic is Changing Cybersecurity

The pandemic has touched virtually every aspect of life, and cybersecurity is no different. A new threat intelligence and cybersecurity status report from Microsoft shows how businesses around the world are changing their approach to cybersecurity to protect user data and systems as more and more teams work remotely. Here’s how the pandemic has changed cybersecurity, and what your business can do differently to protect your data as the situation evolves.

Secure Customer and Employee Data with Nightfall's Data Loss Prevention

It’s estimated that more than 27 billion records were exposed in the first half of 2020, despite the decrease in number of reported breach events from 2019. This trend of data breach events is becoming more severe with the average cost and size of a data breach increasing year over year. The severity of modern data breaches presents a serious risk to companies looking to protect the data of stakeholders such as customers and employees.

Protect credentials and secrets with Nightfall DLP

Sensitive data like credentials and secrets are in constant danger of exposure, and this is especially true in the cloud. Due to the highly collaborative and always-on nature of cloud services, they tend to be environments where security best practices are hard to enforce without either lots of time and effort or automated controls.

Logging of security events in SIEM

Effective logging of events and activities in an organization’s technical infrastructure exponentially boosts the capabilities of its SIEM solution. In this article, we explore how logs are leveraged in a SIEM solution. First off, log entries can be helpful for multiple purposes such as security, performance analysis, troubleshooting, etc. Considering the size of a modern enterprise’s IT technical infrastructure, monitoring the network alone is not a favorable approach.

Why Manually Tracking Open Source Components Is Futile

Open source is everywhere. Everyone is using it. Open source code is found in almost every proprietary software offering on the market and is estimated to make up on average 60%-80% of all software codebases in 2020. Why the proliferation? Open source libraries help developers write code faster to meet the increasingly shorter release cycles under DevOps pipelines. Instead of writing new code, developers leverage existing open source libraries to quickly gain needed functionality.