Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OWASP Clickjacking: The Enhanced Cheat Sheet [XLS DOWNLOAD]

Clickjacking is a widely used cyberattack technique where users are tricked into clicking on something without realizing it’s harmful. Clickjacking attacks can lead to serious problems like data theft and financial fraud, damaging organizations’ reputations. According to the Javelin 2022 Identity Fraud Study, 22% of U.S. adults have been victims of account takeover attacks. But here’s the good part.

Coffee Talk with SURGe: 2023-NOV-28 NCSC 2023 Review, ENISA Report, Netherlands Cyber Assessment

Grab a cup of coffee and join Ryan Kovar, Kirsty Paine, and Floris Ladan for a special EMEA edition of Coffee Talk with SURGe. The team from Splunk will compare highlights and similarities across recent cyber threat reports, including: Ryan and Floris also competed in a 60 second charity challenge to explain the importance of red teaming.

Mastering The DevOps Toolchain: 10 Essential to Build a DevOps Assembly Line

DevOps is more than just a buzzword and the dev behind the magic is more than just a tech wizard who orchestrates software delivery single-handedly. Behind the curtains is an assembly line of toolchains that makes DevOps possible. 44% of DevOps teams use between 2-5 tools, with 41% using 6-10 tools. High-performing teams also tend to use more tools, resulting in faster deployment cycles and delivering multiple times a month.

Velero Backup Essentials: Choosing What Works Best for You

Velero supports multiple types of backups including backups of resource specs, PV snapshots, backups of live PV data, and backups of PV snapshots. In this webinar, we will explain each of these methods in more detail and describe when each is appropriate and why you should pick one over another. The topic of which backup method to use elicits a lot of questions in the Velero forums and among our own user base, and we intend for this webinar to help clarify the matter.

Securing the Weakest Link: A Guide to Third Party Cyber Resilience

We live in a business world where vast amounts of our critical services are delivered to us as a service. The world of on premise solutions has all but disappeared – sure, there are still some systems that operate on premise but these days, more key services are delivered to users and organisations as a service solution. This has increased profitability, allowed small companies to gain access to software and systems that previously were out of reach and has dealt a significant blow to piracy.

Datadog announces commitment to achieving FedRAMP High and Impact Level 5 authorizations

As government agencies accelerate their adoption of cloud technologies—particularly SaaS applications—they need to adhere to strict compliance and security standards. The Federal Risk and Authorization Management Program (FedRAMP) sets these standards for civilian federal agencies, while the Impact Levels laid out by the Defense Information Systems Agency (DISA) in their Cloud Computing Security Requirements Guide set guidelines for Department of Defense (DoD) agencies.