Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

How to Harden Your Cloud Environment in 5 Steps

In recent years, with the rapid rise of cloud computing, the virtualization of applications and infrastructure has been replacing traditional in-house deployments of applications and services. It’s currently more cost-effective for organizations to rent hardware resources from companies like Microsoft, Amazon, and Google and spin up virtual instances of servers with the exact hardware profiles required to run their services.

Lookout CASB Protects Sensitive Data in Slack by Masking data and Watermarking

This video illustrates how Lookout CASB can protect sensitive data, such as a social security number, in Slack by detecting the data in chat and masking that data so that it is not shared in plain text. This video also shows how Lookout applies a watermark to sensitive content allowing addition policy actions to be applied.

Zero Trust? Don't Forget Your Mobile Fleet

Does your Zero Trust strategy include mobile devices? If not, it might have a zero chance of being successful. Hear how to deliver continuous authentication for mobile users connecting to corporate data. Speakers: Tomas Maldonado - CISO, NFL Ramy Houssaini - Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas

What is OWASP Mobile Security Testing Guide (MSTG)?

With millions of apps being released every day and ever-changing feature additions, it is more important than ever for enterprises to focus on security to prevent data breaches. According to Checkpoint, in 2020, 97 per cent of enterprises were confronted with mobile threats employing a variety of attack vectors. What is Mobile Security Testing Guide (MSTG)? The MSTG is a comprehensive manual for mobile app security testing.

Secure your infrastructure from code to cloud

Infrastructure as Code enables you to take ownership of your cloud environments and define what your application needs in a programmatic way. It's appealing because it’s code; you can version it, you can automate testing it using pipelines and you can deploy it frequently on your own. However there is a catch. With this level of autonomy comes increased responsibility and the implicit requirement to have the relevant knowledge needed in order to design and configure secure infrastructure.

Leveraging Artificial Intelligence for Impactful Cybersecurity

Artificial intelligence (AI) is reinventing the trajectory of cybersecurity and fighting with a double-edged sword. If harnessed correctly, AI can automatically generate alerts for emerging threats, detect new types of malware, and protect sensitive data. While it has advanced us into a plethora of new technologies -- think Siri, facial recognition, and Google’s search engine -- it has also probed us with significant threats from cybercriminals.