Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exploiting CVE-2021-3490 for Container Escapes

Today, containers are the preferred approach to deploy software or create build environments in CI/CD lifecycles. However, since the emergence of container solutions and environments like Docker and Kubernetes, security researchers have consistently found ways to escape from containers once they are compromised. Most attacks are based on configuration errors.

Ex-Military Cyber Security Experts: How Military Training Prepares You for Success in Cyber Security

Today we discuss recruiting in the cyber security field from a forces perspective - what to expect coming out of the military, recruiting people from the forces, and how we can bring people into this particular field to address the cyber security skills gap. In this episode, we cover.

What is vulnerability scanning?

Vulnerability scanning is the action of conducting an automated review of your system to look for potential risks and vulnerabilities. For budding information security professionals (or even those who have worked in the field for years), there is always something new to learn. Not only is it a highly intricate and advanced field but, on a daily basis, there is a cat-and-mouse game happening between security engineers and hackers.

Top 7 Cyber security predictions for 2023

As cyber security threats become more complex and sophisticated, old strategies of dealing with these threats are no longer complete. Security and risk management have become a top priority for organizations. New regulations and laws have been passed to protect consumers’ personal information. Organizations are strengthening their security measures and gearing up to defend themselves against ransomware and supply chain attacks. Given below are some top trends to watch out for in 2023..

4 Things to Know about Your Car and API Security

It used to be cool if your car had GPS and a dashboard screen, remote lock on a key, and a video player for the kids to watch movies during road trips. Then came bluetooth for your phone and keyless start. Not anymore. The bells and whistles available in today’s cars have left them all in the dust. Video player? Let’s be honest. This generation knows and expects on-demand streaming to keep them entertained. Cars can now function as fully equipped communications centers.

Introduction to SecurityCoach

Deliver real-time coaching in response to risky user security behavior with SecurityCoach. SecurityCoach is the first real-time security coaching product created to help IT and Security Operations teams further protect your organization’s largest attack surface — your employees. Introducing a new category of technology called Human Detection and Response (HDR), SecurityCoach helps strengthen your security culture by enabling real-time coaching of your users in response to their risky security behavior.

EP 19 - The Cybersecurity Gridiron

In this episode of the Trust Issues podcast, host David Puner interviews Nigel Miller, Director of Security Operations and Engineering at Maximus, a company that provides process management and tech solutions to help governments improve their health and human service programs. Nigel discusses his role in keeping the company’s nearly 40,000 employees cyber-trained and secure.