Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Mend.io - Backstage Integration: Bringing Security Insights Where You Need Them

Launched as an internal project by Spotify in 2016, Backstage was released under the Apache 2.0 open source license in 2020 to help other growing engineering teams deal with similar challenges. Backstage aims to provide a consistent developer experience and centralize tools, documentation, and services within a single platform.

How to Backup and Restore SUSE Virtualization (Harvester) with CloudCasa

In this demo video, Martin Phan, Field CTO at CloudCasa, showcases how to back up and restore containerized virtual machines from SUSE Virtualization (formerly Harvester). The video provides a step-by-step guide to managing Harvester clusters via the SUSE Rancher interface and integrating them with CloudCasa for efficient VM protection and migration. Learn how to.

"Q&A: Digital Threats Landscape" with Joseph Menn

Join us for an insightful conversation with Joseph Menn, veteran cybersecurity reporter for the Washington Post and author of "Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World." In this closing keynote discussion, Menn shares his perspectives on the evolution of cybersecurity, exploring the complex relationship between technology advancement and security.

Introducing The GitGuardian Secret Analyzer

Introducing The GitGuardian Secret Analyzer GitGuardian has always helped you find your leaked secrets, but now GitGuardian can also quickly reveal the permissions of your secrets. One of the first questions any security team needs to ask itself when a secret is leaked is "What exactly could an attacker do with it?" Does it grant read-only access or does it have permissions to write or delete data? At the same time, understanding the correct scope needed for replacing a credential can take a long time, as all too often, the permissions originally granted are poorly documented, if at all.

Security's Confidentiality, Integrity and Availability (CIA) Triad - Outdated or Still Relevant?

Are confidentiality, integrity, and availability still enough, or is it time to evolve our thinking? Join Chris Lindsey and a panel of tech leaders from leading enterprises, for a dynamic discussion on the relevance of the CIA Triad in modern security practices. Chapters: CIA Triad Basics and CVSS Scoring (0:00 - 0:55) Expanded Impact Metrics (0:55 - 2:02) Additional Impact Considerations (2:02 - 2:45) Historical Context and Evolution (3:01 - 3:41) Modern Challenges and Limitations (3:41 - 5:21) Risk-Based Prioritization (5:48 - 6:22) Business Communication Value (6:26 - 8:18)

Kubernetes RBAC: Deep Dive into Security and Best Practices

Kubernetes has revolutionized container orchestration, becoming the go-to platform for managing containerized workloads at scale. However, with its growing popularity, the complexity of managing role-based access control (RBAC) on Day 2 and especially in a multi-cluster environment has become a daunting task. DevOps, SRE, and Platform teams are responsible for multiple clusters and different teams.