Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CloudCasa October Feature Updates

It’s autumn again here in New Jersey, home of Catalogic Software and global hub of CloudCasa engineering. Temperatures are getting cooler, leaves are starting to turn, and the scent of hot cider and pumpkin spice latte is in the air. But here and in our offices around the world, CloudCasa development is continuing to heat up. This is the fourth October since CloudCasa’s 2020 debut, and we’re pleased to announce our 18th significant feature update.

Policy as code in Kubernetes: security with seccomp and network policies

The dynamic world of Kubernetes and cloud security is constantly evolving. As we explore this complicated ecosystem, it’s crucial to understand the role of policy as code (PaC) and its impact on operations and security teams. Emerging from the broader paradigm of infrastructure as code (IaC), PaC represents a significant shift in how we manage and secure cloud-native environments.

Teleport delivers "crown jewel observability" with access control monitoring for critical infrastructure resources

New updates to Teleport Policy enable security professionals to cut through the noise of alert fatigue, with "Crown Jewel" tagging and monitoring for access variances in critical resources.

Ensuring comprehensive security testing in DevOps pipelines

DevOps has dominated the 21st-century software industry as a powerful methodology for streamlining processes and improving collaboration between development and operations teams. However, as organizations shift towards this model, a critical aspect is often overlooked: security. This led to the advent of DevSecOps, an approach that aims to bridge the gap by integrating security practices into DevOps workflows.

Cisco's CI/CD Pipeline Weaknesses:Hard-Coded Credentials & Misconfigurations Revealed

In recent weeks, reports have surfaced regarding a significant breach involving Cisco, exposing sensitive data from various organizations. This blog post delves into the details of the breach, the compromised data, the implicated companies, and the methods used by attackers to gain access to such critical information.