Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Enabling Workload-Level Security for Kubernetes with Checkpoint Firewall and Calico Egress Gateway

Enterprises implementing containers and Kubernetes in either corporate datacenters or cloud environments typically employ Checkpoint Quantum to secure traffic between their datacenter networks and Checkpoint CloudGuard to safeguard their cloud resources. Often these network security perimeter focused solutions are also used to scrutinize traffic originating from Kubernetes clusters.

Cognitive Fitness: Cybersecurity Perspective on Complex VUCA Environments

Cybersecurity is a dynamic, ever-evolving space where traditional approaches often fall short. To thrive in this environment, one must cultivate the ability to think differently and harness cognitive skills to a higher degree than in many other fields. Bec McKeown emphasizes cognitive fitness through the lens of the cybersecurity realm's complex VUCA (Volatility, Uncertainty, Complexity, Ambiguity) environment.

Coffee Talk with SURGe: 2023-OCT-03 WS_FTP RCE, Exim Scope, ChatGPT, Cybersecurity Awareness Month

Grab a cup of coffee and join Mick Baccio, Ryan Kovar and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan competed in a 60 second charity challenge to share the pros and cons of Cybersecurity Awareness Month.

Shira Rubinoff at Blackhat with Israel Mazin, CEO and Chairman of Memcyco

Amidst the electric atmosphere of the Black Hat conference, where cybersecurity luminaries converge to explore cutting-edge innovations, a spotlight shone on Memcyco's CEO, Israel Mazin. In a recent interview captured on film, Israel Mazin engaged in a dialogue with tech influencer and member of our advisory board, Shira Rubinoff. Together, they delved deep into Memcyco's paradigm-shifting product solutions that are challenging the status quo of the threat intelligence landscape.

Automatic Application Protection using Red Hat Advanced Cluster Management with Trilio

See how easy it is to protect a newly deployed application into OpenShift using Red Hat Ansible Automation Platform, followed by an ACM Policy written for Trilio that will auto protect the deployed application (create a backup, according to the policy)