Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Any2Cloud to Recover Kubernetes Clusters from GKE to AKS

Learn how easy it is to do a full-stack migration of a Kubernetes application from GKE to AKS using CloudCasa. In the video, Martin Phan demonstrates how to use CloudCasa do a GKE backup of an application that is using MySQL on a PV, and then recover the application to AKS using the Any2Cloud recovery capability of CloudCasa.

Software and AppSec Challenges and Opportunities in Banking and Fintech - Part Two

In this, the second of three blog posts, we continue to examine the issues discussed in our recent webinar, “Software and Application Security Challenges and Opportunities in Banking.” In the webinar, Rhys Arkins, Mend’s VP of Product Management, was joined by James McLeod, Director of Community of the Fintech Open Source Foundation (FINOS); Kate Stewart, VP of Dependable Embedded Systems at the Linux Foundation; and Amol Shukla, Executive Director of Engineering at Morgan Stanley, to

Devices: Allow Undock Without Having to Log On

The Devices: Allow undock without having to log on setting on laptops and computers is extensively used to provide people with the convenience of undocking their systems without having to log on repeatedly. This comes in handy for portable devices that need to be undocked from the docking station multiple times. You can just hit the eject button and safely get your laptop away from the docking station.

Control Web Panel Vulnerability, CVE-2022-44877, Actively Exploited in the Wild

This post offers details on the Control Web Panel Vulnerability, CVE-2022-44877, which is actively being exploited in the wild. If you are using Control Web Panel in any version below 0.9.8.1147, make sure to patch as soon as possible. While CVE-2022-44877, a critical vulnerability affecting Control Web Panel (a popular free, closed-source, web-hosting interface), has received an official patch on October 25th 2022, evidence of active exploitation of the vulnerability are starting to accumulate.

6 Tips to Setup Foolproof AWS Security Groups

Adopting cloud technologies is one of the most common tech strategies followed by modern organizations. This may be due to various reasons depending on the nature of the business. But there are a few standard components that span across most domains, not least the fact that cloud vendors allow developers to easily create and take down resources on the cloud with minimal effort.

Where is Your Risk? Vulnerabilities in Software Development

Organizations are facing a variety of software-related risks, and vulnerabilities introduced in the development process are just one of them. The sooner they can figure out where these risks exist and how to address them, the better they can mitigate them and bolster their overall cybersecurity profile. In a series of posts, we will take a look at some of the key software risks organizations are grappling with today. First up: vulnerability risk that emerges during software development.

Software and AppSec Challenges and Opportunities in Banking and Fintech - Part One

The banking and fintech industries live and die on the reliability of the online services they offer. It’s vital that the sensitive data that the industry handles is robustly protected, and that the software and applications that it uses are secure. For effective software and application security, it’s critical that banking and fintech organizations rapidly detect, identify, and remediate software vulnerabilities.

Passkeys for Infrastructure

I predict that 2023 will be the year of Passkeys. Passkeys are a new passwordless authentication method allowing users to create online accounts and sign in without entering a password. Passkeys have been years in the making and finally, industry fido alliance collaboration (fido2) and the adoption between Apple, Microsoft, and Google have now made it a reality. Passkeys leverage the WebAuthn API to let users log into various websites and applications.