Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

23 NYCRR Part 500 Amendment Compliance Checklist

Banks and Insurance companies in New York are grappling with the complexities of 23 NYCRR Part 500, a challenging cybersecurity regulation that demands comprehensive and nuanced security measures. The primary hurdle for these organizations is translating the regulatory language into actionable, practical steps that meaningfully enhance their cybersecurity posture.

Teleport Identity & Policy: Deep Technical Dive with Xin Ding

As digital environments expand, the challenges of protecting critical infrastructure continue to grow. Join us in this insightful discussion as we dive into the complex landscape of cybersecurity. This video explores key industry trends, major threats to infrastructure, and actionable strategies for improving security.

Breaches & Compromises in 2024: How to Build a Defense with Eddie Glenn

Did you know that 3 out of 4 companies agree that securing infrastructure is becoming more challenging each year? As environments grow in complexity and cyber threats like identity-based attacks evolve, security teams face mounting pressure to keep systems safe without sacrificing productivity. In this video, we explore the parallels between dystopian themes in anime and the real-world challenges of cybersecurity.

Mend.io - Backstage Integration: Bringing Security Insights Where You Need Them

Launched as an internal project by Spotify in 2016, Backstage was released under the Apache 2.0 open source license in 2020 to help other growing engineering teams deal with similar challenges. Backstage aims to provide a consistent developer experience and centralize tools, documentation, and services within a single platform.

How to Backup and Restore SUSE Virtualization (Harvester) with CloudCasa

In this demo video, Martin Phan, Field CTO at CloudCasa, showcases how to back up and restore containerized virtual machines from SUSE Virtualization (formerly Harvester). The video provides a step-by-step guide to managing Harvester clusters via the SUSE Rancher interface and integrating them with CloudCasa for efficient VM protection and migration. Learn how to.

Kubernetes RBAC: Deep Dive into Security and Best Practices

Kubernetes has revolutionized container orchestration, becoming the go-to platform for managing containerized workloads at scale. However, with its growing popularity, the complexity of managing role-based access control (RBAC) on Day 2 and especially in a multi-cluster environment has become a daunting task. DevOps, SRE, and Platform teams are responsible for multiple clusters and different teams.

Introducing The GitGuardian Secret Analyzer

Introducing The GitGuardian Secret Analyzer GitGuardian has always helped you find your leaked secrets, but now GitGuardian can also quickly reveal the permissions of your secrets. One of the first questions any security team needs to ask itself when a secret is leaked is "What exactly could an attacker do with it?" Does it grant read-only access or does it have permissions to write or delete data? At the same time, understanding the correct scope needed for replacing a credential can take a long time, as all too often, the permissions originally granted are poorly documented, if at all.