Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hello CISO - Episode 4: Employee Surveillance vs. Enterprise Security

How do you balance data collection at work with workers’ inalienable right to privacy? It's a fine line to walk, but if you always err on the side of employee privacy, it's hard to go wrong. In this episode of Hello CISO, Troy breaks down how to systematize that balance – and how to uncover the hidden costs of data collection. Hello CISO is a new series aimed at Chief Information Security Officers, IT security teams, and all other members of an organization responsible for maintaining the safety and integrity of the business and its operations.

Announcing Snyk free security for open source projects

Snyk announces expanded free offerings for open source project maintainers including unlimited scans across our platform and additional features. Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.

A Glimpse Into the Dark Web

See this session to understand how the dark web works, who are the individuals who go there and how they conduct business. You will also see how Cyberint conducts complex HUMIT (human intelligence) operations in order to get valuable and actionable information. Presented by Jacob Silutin - Sales Engineer, Cyberint, at Cyber Security Digital Summit - Threat Detection and Response on 22nd February 2022.

SANS 2022 Ransomware Defense Report

The years 2020 and 2021 were undoubtedly the years of ransomware. Threat actors wasted no time taking advantage of the chaos caused by the COVID-19 pandemic, launching attacks that netted millions (if not billions) of dollars in extortion fees and leaked a record amount of data from victim organizations. On this webcast, we will look at how ransomware defenses have changed from 2020 through 2022. The webcast will also explore ransomware threat actor changes, current trends, and how to implement defenses against those trends.

How Compliance Professionals Uses Egnyte

Chief Security Officer Kris Lahiri showcases how he uses Egnyte for compliance. This video shares how to assign data owners, monitor data governance, and manage content’s lifecycle. This video showcases how users can easily assign data owners to manage rules of engagement, retention policies, and monitor audits of the data. Whether utilizing content lifecycle management, setting engagement notifications, or monitoring usage, you can stay on top of tasks all within Egnyte.

Tripwire Change Analyzer Quick Start

Tripwire Change Analyzer automates the verification and promotion of “known good” and business as usual changes that are the result of software updates, upgrades, and patches, saving IT organizations time, reducing human error, and increasing efficiency. Tripwire Change Analyzer also works in concert with Tripwire Enterprise to deliver alert notifications and granular details needed for rapid response when unexpected, unauthorized, or high-risk changes are detected. Check out this quick start tutorial video on how to get started with using Tripwire Change Analyzer.

Cross-Account and Cross-Cluster Restore of Kubernetes Applications

Cross-Account and Cross-Cluster Restore of Kubernetes Applications Using CloudCasa. Users can now browse and map the available storage classes in the source and destination cluster when restoring. When performing cross-account Kubernetes restores in AWS, the system will now automatically handle changing volume IDs for PVs. Additionally, when creating an EKS cluster on restore, CloudCasa now allows customization of the IAM role, security group, VPC group etc. to be used in the new account.