Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hands-on guide: How to scan and block container images to mitigate SBOM attacks

According to OpenLogic’s Open Source Adoption and Expansion in 2022 Report, the adoption of Open Source Software (OSS) across all sizes of organizations is rising with 40% of respondents stating an increase of OSS software over the previous year and 36% reporting a significant increase in OSS software usage. The increase in OSS adoption can be attributed to a number of factors including access to the latest innovations, reduction in costs and frequent product updates.

CrowdStrike Delivers Cyber Resilience for the Airline Industry to Meet New TSA Requirements

The U.S. Transportation Security Administration (TSA) is taking proactive measures to protect the nation’s transportation system by issuing new cybersecurity requirements for airports and aircraft operators. These emergency actions from TSA are part of the plan to increase the cyber resiliency of critical infrastructure and prevent their degradation or disruption.

How To Detect and Prevent Insider Threats

‍Insider threats are one of the biggest internal cyber threats to organizations because they are often detected too late, and the responsible individual has access to sensitive information that gets released or exposed. Insider threats can pose a significant concern for organizations of all sizes and industries because they can result in severe financial and reputational damage and even legal penalties.

Protegrity

Our data protection system protects sensitive data anywhere and everywhere, empowering organizations across the globe to use data to create better customer experiences, make intelligent decisions, and fuel innovation.

Corelight Open NDR Now Helps Defend Black Hat Events

We are honored to announce that Corelight’s Open Network Detection and Response (NDR) solution has been chosen by the esteemed Black Hat Network Operations Center (NOC) to help defend their networks at Black Hat events worldwide. It’s a testament to the capabilities of our platform and the open source technologies that power it. We are honored to be among the distinguished vendors chosen to provide best of breed solutions for the NOC.

A SaaS Multi-Cluster Manager for Velero

Welcome to another video on CloudCasa for Velero: A SaaS Multi-Cluster Manager for Velero backups. In this video, Martin Phan, Field CTO for CloudCasa, will show you the first-hand look of the integration that CloudCasa has with Velero and its centralized GUI that helps users manage and monitor their Velero-based backups. You will find out how CloudCasa for Velero is able to aggregate data across multiple Kubernetes clusters across all hybrid and cloud environments. If you are using Velero today, please check this demo on CloudCasa for Velero and learn more about its multi-cluster management functionality and full stack recovery capabilities using the intuitive GUI.

Ad-Hoc Job Runs and Creating backup and Restore Custom Resources for Velero

Welcome to another video on CloudCasa for Velero, in which Martin Phan, Field CTO for CloudCasa, will show you how you can easily form Ad hoc job runs for Velero in CloudCasa. He will also demonstrate how you can create backup and restore Custom Resources in CloudCasa for Velero and get notifications directly from the CloudCasa service that is running within Velero. Through functionality already native to CloudCasa such as full stack recovery, email alerting and role-based access control, CloudCasa for Velero can be that single pane of glass to manage and report on all your Velero installations throughout your enterprise. So do give CloudCasa for Velero a try and do let us know what you think.

The New UK Telecommunications Security Act: What It Means For You

Back in November 2020, the UK Telecommunications (Security) Act started its journey through the Houses of Parliament, and after many readings and much consultation it finally went live almost two years later on the 1st October 2022. At the heart of the Act was a desire to improve the security posture of the UK’s telecoms networks, infrastructure, and organisations, recognising the importance of telecommunications as part of the UK’s critical national infrastructure (CNI).

Six Key Considerations When Deploying a Web Application Firewall

839 million attacks ranging from DDoS and bot to Zero-day and OWASP Top 10 attacks were recorded on the AppTrana WAF on just 1400 web and API applications. So, implementing WAF as a first layer of defence is a no-brainer. That said, dozens of established start-ups operate in this space, and choosing a WAF provider can be daunting. It is essential to consider various factors to ensure the selected WAF meets your organization’s unique needs and requirements.