Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Enhanced Network Evidence for the Modern SOC

Security leaders protect their businesses by using analytics and insights to understand security needs, attack surfaces, and trends. Every company from ‘big box’ travel sites to powerhouse car manufacturers needs to optimize their SOCs, retain talent, and expand business opportunities securely.

Viking Yachts Protects Intellectual Property From a Departing Employee (Case Study) | CurrentWare

“CurrentWare saved us a lot of time and money; when the employee was questioned about the data transfer they folded. I cannot thank all of you enough for this software. Being able to audit removable drives is invaluable.” A lot has changed in the world since our first case study interview in 2021 with Vincent (Vinny) Pecoreno, the Network Administrator for Viking Yachts.

Rise of the Secure Developer from Atlassian Team '22: Tomás González - Partner Solution Architect

This talk by Tomas Gonzalez, partner solutions architect at Snyk, talks about the rise of the security-conscious developer - someone who champions the use of new cloud technologies with a security mindset. This doesn’t mean developers are solely responsible for security risk management in isolation; secure developers are aware of risk management processes, are armed with the right technology to enforce them, and apply a shared-responsibility mentality to enable an agile, thriving secure business.

SANS Protects Web Applications and Services

Organizations have moved more of their infrastructure and services online to benefit employees and customers. However, as the usage of web applications has risen, security threats against them have also increased. This SANS podcast discusses the top threats to web applications and provides guidance on how to mitigate the biggest risks.

Enabling Self-Service Recovery in a Multi-Tenant Kubernetes Environment with CloudCasa and Capsule

At KubeCon Europe 2022, we held a virtual booth office hour session with our new partner Clastix. In this video, Dario Tranchitella, the lead architect for Capsule by Clastix discusses and demonstrates how the combination of Capsule and CloudCasa provides easy self-service backup and recovery in a multi-tenant Kubernetes environment.

Spotlight on Technology - Governance, Risk & Compliance

Today we are talking all things GRC with Megan Brown at LogicGate, including why it's essential to have a robust GRC tool in a modern security stack. GRC is extremely useful for compliance framework management and maintaining compliance - it can be used effectively to supply a historical database of known risks, issues and security measures that can be used to continuously improve security intelligence. Join Megan and Razorthorn MD James Rees to find out how a good GRC tool can save you both time and money, while efficiently improving your security and compliance.

Human activated risk is real

Human activated risk is real for every organization Whether it’s introduced through coercion by bad actors, human error, or malicious intent, human activated risk is a problem that keeps getting worse. Organizations need intelligent technology that can stop the sophisticated phishing attacks that continue to evade native security defenses, as well as outbound email risk which is too often underestimated.

How Malicious NPM Packages Make Your Apps Vulnerable

Zbyszek Tenerowicz (a.k.a. ZB) teaches us how we can be susceptible to malicious packages as developers. We also see demos on the possibilities of what a malicious package can do such as modify code, package.json publish scripts and more. You're sure to learn something new in this session and level up your Developer security skills. This was a recorded livestream titled "My NPM Package Will Eat Your Lunch".