Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Advance ICS Cybersecurity: Implement Continuous Monitoring

Industrial control systems are fundamental to all industrial processes, from power generation to water treatment and manufacturing. ICS refers to the collection of devices that govern a process to ensure its safe and effective execution. These devices include Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control systems like Remote Terminal Units (RTU) and Programmable Logic Controllers (PLC).

SOC 2 Compliance for SaaS Startups & Top Pitfalls to Avoid | Raghu (Co-Founder, Sprinto)

Overview: In this session, Raghu (Co-Founder, Sprinto) discusses with Venky how SaaS Startups have to upgrade their security standards significantly to become SOC 2 compliant and the major pitfalls they should avoid. He differentiates between SOC 1, SOC 2, & SOC 3 compliance in super-easy terms and highlights some overlapping parameters between security standards like ISO 27001, PCI DSS, HIPPA, GDPR, etc.

Under the Wing: Automating Workflows with Falcon Fusion

76% of organizations report not having enough qualified security specialists. 80% of them report alert fatigue — with analysts scrambling to respond to multiplying alerts and few to no processes to streamline investigation and response. Join us in the next episode to learn how teams are using tools like Falcon Fusion to automate workflows, streamline operations and keep their team moving fast.

The Importance of People in Cyber Security: A Process and Technology Perspective

In this video, we delve into the crucial role of people in cyber security. Following the people-process-technology approach, we discuss why having the right individuals in place within an organization is key. Learn how the skills of these individuals define your processes and how technology can aid in augmenting your efforts. Discover why the people element should always be the focus and why it's not always easy to find the right individuals when you need them. Join us in exploring the importance of people in cyber security.

The Top Cyber Attacks of January 2023

The new year is upon us, but from a cybersecurity perspective, things look much the same as they did last year. January brought fresh attacks on a pair of familiar targets, high-stakes escalations in the ransomware game, and questionable crisis management from a high-profile victim. In other words, business as usual for cybercriminals! Let’s look at a few noteworthy cybercrimes from January 2023.

Veracode Container Security

Introducing Veracode Container Security - this new tool is now seamlessly integrated with the Continuous Software Security Platform. Veracode Container Security is a command line interface (CLI) tool that integrates into your pipeline with ease. This empowers developers to secure containers earlier in the software development life cycle, ensuring containers are built and deployed securely.

How to Leverage Veracode Container Security to Secure Cloud-native Application Development

Cloud-native software development is a driving force because it empowers teams to build and deploy applications at speed and scale. Along with microservices, cloud infrastructure, and API’s, containers are a crucial part of this development process. Let’s look at the security implications of containers in cloud-native application development and how to manage the security challenges they pose.