Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Building a Cyber-Resilient Future Together

Last week in New York, I had the opportunity to attend a panel discussion hosted by SINET and moderated by Upendra Mardikar, the Chief Information Security Officer of TIAA. We discussed everything from security in DevOps, to AI’s pros and cons, and cybersecurity’s future. As long as the attack surface, API usage, and digital footprints increase, so will cyber risk.

Hack the Building 2.0 Hospital - Training New Cybersecurity Talent

This year for the 13th year in a row, the healthcare industry continues to experience the most expensive data breaches worldwide, at an average cost of nearly $11 million – double the cost for the next-highest industry, finance. That’s not surprising; ransomware attacks on hospitals and health systems are constantly in the news. Add to that the cybersecurity talent shortage, which is especially acute (pardon the pun) in the healthcare industry.

From Scan to Strategy: Balancing Vulnerability Assessments with Penetration Testing in Cybersecurity

In the realm of cybersecurity, there's a common analogy that likens the process to a health checkup. Vulnerability scanning, in this context, can be seen as a basic health screening. It's a preliminary step, offering a snapshot of potential issues within a system. It's like getting your blood pressure or cholesterol checked during a routine visit to the doctor. These tests are essential, providing a quick overview of potential health concerns. But they don't give the full picture.

Automatic Application Protection using Red Hat Advanced Cluster Management with Trilio (with Audio)

(With Audio) See how easy it is to protect a newly deployed application into OpenShift using Red Hat Ansible Automation Platform, followed by an ACM Policy written for Trilio that will auto protect the deployed application (create a backup, according to the policy) In this video we will show you an example of using Red Hat Advanced Cluster Management (or ACM) and Trilio to automatically back up an application that has just been deployed.

Restore your OpenShift Virtualization VMs with Trilio (With Audio)

Use the Trilio UI to Restore your OpenShift Virtualization Virtual Machines. In this video we will show you how to restore a previously backed up virtual machine running in OpenShift using Trilio As we are restoring a virtual machine to the same cluster that we backed up earlier, we can use the Trilio User Interface to simply list the deployed virtual machines, and see that the status of the last backup is marked as Available for this virtual machine.

Backup your OpenShift Virtualization VMs with Trilio (With Audio)

Use the Trilio UI to Backup your OpenShift Virtualization Virtual Machines. In this video we will show you how to backup individual virtual machines from OpenShift using Trilio. First we are going to log in to the Trilio User Interface using our OpenShift credentials. Trilio has a Backup Wizard that allows you to select your individual VMs that you have access to in your cluster. We’ll select this Virtual Machine and click Next.

2023 OWASP Top-10 Series: Spotlight on Injection

Welcome to the 12th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a particular focus on security practitioners. In this series we are taking an in-depth look at each category – the details, the impact and what you can do about it. To see previous posts you might have missed, click here. This post will put a spotlight on Injection, which used to be its own category (OWASP API8:2019) but has now been subsumed into OWASP API10:2023 (Unsafe Consumption of APIs).