Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Content Marketing in the Age of Short Attention Spans

Are you interested in creating content that connects with people these days? Good luck. Everyone's attention span is shorter than a tweet in the social media and smartphone age. By the time you finish reading this sentence, someone has already scrolled past three cat videos and a photo of their friend's avocado toast. Getting real engagement feels nearly impossible.

JUMPSEC team inspires local primary school children to consider a future career in cyber-security

Acton-based cyber security company, JUMPSEC, recently visited a local primary school to share how its team protects some of the world's biggest brands from hackers, malware, and other cyber-attacks. As Ealing Borough's security partner, JUMPSEC has teamed up with the council to collaborate and deliver social value to the community. This kicked off on Friday 22nd of September, at Dairy Meadow Primary School in Southall as part of its first careers event of the academic year.

Setting up a Kubernetes cluster

Kubernetes is an open-source platform for governing clusters of containerized application services. Kubernetes automates the vital aspects of container lifecycle management, including scaling, replication, monitoring, and scheduling. The central component of Kubernetes is a cluster, which is itself made up of multiple physical or virtual machines.

Elastic wins 2023 CyberSecurity Breakthrough Award for Cloud Security Platform of the Year

Elastic's cloud security solution recognized for comprehensive protection of cloud-based workloads We are excited to announce that Elastic® has been honored with the CyberSecurity Breakthrough Award 2023 for Cloud Security Platform of the Year. This award recognizes our open, unified solution with integrated cloud security capabilities that protect both cloud-native and hybrid workloads, enabling analysts to defend against cloud misconfigurations, vulnerabilities, and runtime attacks.

Bot Attacks Are Costing Businesses As Much As Traditional Cyberattacks

Security professionals would be considered foolish if they didn’t have a plan to mitigate a ransomware attack, especially for businesses generating hundreds of millions, if not billions, in turnover. And yet, a threat type that isn’t given nearly the same level of concern by the top brass – malicious automation carried out by bad bots – is costing these companies just as much, if not more, every year.

EP 37 - Cloud Transformation and the Art of Simplicity

Arati Chavan, Staff Vice President, Global Head of Identity and Access Management (IAM) at Elevance Health joins host David Puner for a conversation that sheds light on how federated identity solutions are pivotal in achieving efficient and secure access control across diverse entities. Chavan also explores the challenges and opportunities in cloud transformation, the evolving role of AI in healthcare and the delicate balance between customer simplicity and robust security measures.

Medical Device Security Risk Assessment [Download XLS Template]

When you think about hacking stuff, you probably don’t consider thermometers and pacemakers. But imagine the implications if that chunk of metal inside your body suddenly starts acting weird. From the humble thermometer to the sophisticated MRI machine, these gadgets are vital cogs in the healthcare machine and potential Trojan horses if not correctly secured.

How a Major Network and Cloud Security Provider Uses SafeBreach for Security Control Validation

Between the time it takes to stand up a new security tool in an IT environment, the resources needed to continually train personnel to effectively use each tool, and the raw cost of the solution itself, enterprise security teams invest quite a lot when introducing new security controls. Solutions that have been in place for a long time have likely grown with the team’s needs, and are well trusted within the organization.