Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Falcon Cloud Security Enforcing Compliance: Demo Drill Down

The increased use of public cloud infrastructure has resulted in an explosion of cloud misconfigurations and vulnerabilities, resulting in non-compliance within organizations cloud environments. See how CrowdStrike Falcon® Cloud Security provides complete visibility and assessment into your multi-cloud deployments so you can take appropriate actions to enforce compliance.

Cloudy with a chance of more customers

As customers adopt a digital lifestyle, the financial services required to support their online purchases are growing at an unprecedented pace. To match these challenges IT organizations are frequently turning to the cloud and replacing traditional services. Cloud services are already well-rooted in virtually every aspect of the financial services industry and all signs point to this continuing into the future.

Beam OSS: Easily Make your Infra Private Using AWS SSM

Beam is an OSS project that simplifies secure access to private infrastructure within non-public VPC environments. It replaces the traditional bastion host approach with AWS Systems Manager (SSM) for access, ensuring better security and user-friendliness, especially in dynamic environments with changing resources and multi-tenancy requirements. Beam eliminates the complexities of configuring SSM access, making it an accessible solution for various applications and environments while maintaining security best practices. Today Beam is available for AWS (SSM) and will expand to Google's Identity-Aware Proxy (IAP).

A10 Networks Simplifies Google Cloud Platform Cloud Deployments

A10 Networks has expanded its robust application delivery controller (ADC) solution to Google Cloud Platform (GCP), meeting the increasing demand for powerful and scalable application delivery in the cloud. Customers can now rapidly deploy A10 Thunder® ADC on GCP via the Google Cloud Marketplace.

Testing with OpenAPI Specifications

The 2023 SANS Survey on API Security (Jun-2023) found that less than 50 percent of respondents have API security testing tools in place. Even fewer (29 percent) have API discovery tools. Wallarm delivers both these capabilities via our single, integrated App and API Security platform. Wallarm has long offered the ability to generate OpenAPI Specifications (aka Swagger) based on actual traffic across your endpoints.

Navigating SBOM: What Are The Implications for Device Manufacturers and Healthcare Providers

In an increasingly interconnected world, the Internet of Things (IoT) has become a significant driver of innovation across various industries. Healthcare institutions were early adopters of IoT technology, leveraging it to improve patient care, streamline operations, and enhance data management. However, this surge in IoT adoption brings with it new challenges, one of which is the need for more transparency and security in the supply chain of connected medical devices.

Trustwave Measures the Pros and Cons of President Biden's Executive Order to Regulate AI Development

President Joe Biden, on October 30, signed the first-ever Executive Order designed to regulate and formulate the safe, secure, and trustworthy development and use of artificial intelligence within the United States. Overall, Trustwave’s leadership commended the Executive Order, but raised several questions concerning the government’s ability to enforce the ruling and the impact it may have on AI’s development in the coming years.

The 443 Podcast - Episode 267 - The White House Tackles AI

This week on the podcast we cover an Executive Order from the US White House on the topic of Artificial Intelligence. After that, we discuss the latest CISO that has found themselves in hot water with the law. We then cover an update to the Common Vulnerability Scoring System and end with a researcher claiming the end of encryption as we know it. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.