Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Best Practices for Using ionCube Encoder in CI/CD Pipelines

With the growing adoption of automated build pipelines, the ionCube Encoder CI Edition offers a tailored solution for developers needing flexible, temporary machine licensing within their CI/CD workflows. The CI Edition is ideal for use in ephemeral environments like Docker containers or cloud-based runners, allowing encoding operations to occur seamlessly as part of your integration process. If you’re not yet familiar with this product, our FAQ entry provides a concise overview.

What are CIS Benchmarks and how to use them?

A list of 18 procedures (reduced from 20), or “controls,” recommended by the Center for Internet Security (CIS), must be followed to build an IT infrastructure resistant to cyberattacks. The CIS 4th Control advises to establish and maintain a secure configuration process for enterprise assets (end-user devices, including portable and mobile; non-computing/IoT devices; and servers) and software (operating systems and applications) (4.1).

ARMO vs. Wiz: Bridging the Gap in Cloud Runtime Security

The recent news about Google’s multi-billion-dollar acquisition of Wiz has sparked widespread conversation across the cybersecurity world. Its price tag reflects its strong reputation, Wiz is a leader in Cloud Security Posture Management (CSPM) solution. Its strength lies in identifying potential risks before they impact your live environment.

Introducing Mend's Integration with Microsoft Defender for Cloud

We’re excited to announce a powerful new integration between Mend.io and Microsoft Defender for Cloud (MDC)—a step forward in our mission to bring intelligent, actionable, and context-rich open source security directly into the cloud security workflow. As organizations embrace cloud-native architectures, security teams face the growing challenge of identifying and prioritizing the open source software risks that truly matter.

Selective Backup & Restore for KubeVirt VMs

Easily protect your virtual machines running on KubeVirt, Red Hat OpenShift Virtualization, or SUSE Virtualization (Harvester) with CloudCasa! This video shows how to perform selective backup and restore of VMs inside your Kubernetes environment with just a few clicks. Whether you're managing critical workloads or large-scale clusters, CloudCasa gives you granular control to protect only what matters — and recover fast. Compatible with modern K8s virtualization platforms, CloudCasa makes VM-level protection simple and powerful.

How to Easily Backup and Restore Red Hat OpenShift Virtualization VMs (Updated Tutorial)

In this tutorial, Martin Phan, Field CTO at CloudCasa, demonstrates how to easily back up and restore virtual machines (VMs) in Red Hat OpenShift Virtualization. You'll learn how to register your OpenShift cluster with CloudCasa, protect containerized VMs, and perform full VM restores — including the ability to restore to a different or existing namespace with options to clear the MAC address and generate a new firmware UUID. Martin walks you through the complete process: installing the agent, defining backup jobs, monitoring backup activities, and restoring VMs step-by-step.

Using CIS Hardening Scripts for Windows Server: Benefits and Risks

With each new version of Windows Server released, comes new security risks. Whilst each update enhances functionality for users, it can sometimes come at the cost of new vulnerabilities. The Centre for Internet Security (CIS) Benchmarks serve as a security baseline, helping both individuals and companies implement best practices for a secure configuration.

Securing AI Isn't Just About Your Pipeline #AIsecurity #DevSecOps #AppSec #redteaming

Building AI apps securely is not just about plugging tools into your dev pipeline. It’s about knowing what to do with those tools after they give you results. What risks matter? What policies should you apply? And when is the right time to integrate AI security into your CI/CD? Bar-El Tayouri sits down with Ashish Rajan from The Cloud Security Podcast to discuss why red teaming and scanning aren’t enough and how getting comfortable with AI security before production pays off long-term.