Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Random but Memorable - Episode 10.5: Ban Cloud Fan Fiction with Stu Hirst from Trustpilot

Will TikTok be banned in the US? How much of a security risk is ChatGPT? We debate all that and more in Watchtower Weekly. Plus, we're joined by Stu Hirst, Chief Information Security Officer at Trustpilot. Tune in, as we discuss common cloud security banana-skins and the challenges facing CISOs in 2023.

Banks are leveraging modern cloud security tools to mitigate human error

The efficiency, security, and scalability of cloud operations are driving financial institutions’ adoption of the technology faster than ever before. The ability to meet customers where they want to transact, personalize solutions, and leverage new data and analytics solutions (including AI) on-demand is driving this growth. In fact, according to Accenture, the banking industry's workloads in the cloud more than doubled from 2021 to 2022.

Data sovereignty in the cloud: A Canadian perspective

Cloud computing has made its way to organizations’ IT infrastructure strategy rapidly over the past few years. In particular, Canadian businesses are showing an increased adoption. This article decodes how Canada’s IT infrastructure shaped up in the last decade, why data sovereignty is now a hot topic, and what the future holds for the cloud. While on-premises IT infrastructure continues to be relevant even today, both SMBs and enterprises are now embracing the cloud more than ever.

Recap: Stress-Free Security for Devs and Ops on AWS

Snyk recently hosted a half-day virtual event focused on security for application workloads running on AWS (you can catch it on demand here). The event was broken into six sessions spanning topics like developer challenges in cloud-native AppDev, top vulnerabilities from last year, hands-on workshops with industry-leading technology vendors, and several other subjects that help enable engineering and security teams to build a successful DevSecOps workflow.

Effective Cloud Incident Response: Fundamentals and Key Considerations

Human error behind misconfigurations, a host of insecure remote access issues, exposed business credentials with reused passwords and unpatched vulnerabilities have all contributed to a significant increase in cloud security incidents. Many organizations don’t foresee the challenges of what it will take to protect their data and operations after a move to the cloud.

Elevate your AWS Experience: Unleash the Power of Veeam BaaS with David Johnson and Sagi Brody

In this video, we're taking a deep dive into the world of Veeam's BaaS solutions on AWS. You'll get an insider's perspective on navigating this powerful tool, optimizing your backup strategy, and ensuring seamless recovery. With Industry Leaders David Johnson and Sagi Brody! Unleash the Potential of Your AWS Environment! In this highly informative webinar, we bring you two renowned experts in AWS Marketplace: David Johnson, Head of Business Development at AWS Marketplace, and Sagi Brody, CTO at Opti9.

AWS in 30 recap

Last month, Lead Partner Solutions Architect, David Schott, presented a demo on how Snyk works alongside Amazon Web Services (AWS) to identify vulnerabilities at every level of development and infrastructure. David covered why agile development in the cloud requires a different security approach than simply using the IT security methods of the past. Then, he showed a real-time example of how Snyk’s AWS cloud security tools can find and mitigate common vulnerabilities.