Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Identity-Based Data Security on AWS

Speakers: Dave Cole, CEO of Open Raven Ev Kontsevoy, CEO of @Teleport Modern data drives business value. But the speed with which it is created and accessed across a global AWS footprint increases risk considerably. The old ways of securing data – VPNs, shared credentials stored in a secure vault, offsite backups – are no longer sufficient and don't work at cloud-scale. Join Teleport CEO Ev Kontsevoy and Open Raven CEO Dave Cole as they present a practical view of modern data security in two parts.

How to Migrate Your Legacy CurrentWare Software to the New Web Console (2022 Tutorial) | CurrentWare

In this video you will learn how to easily upgrade from the legacy desktop version of the CurrentWare Suite to the new web console. By upgrading to the web console you'll gain access to a variety of new capabilities.

Splunk Global Research: The State of Security 2022

Splunk's State of Security report for 2022 found that security organizations face more — and more serious — challenges than ever before. Exacerbated by the pressures of the pandemic, the rise of dangerous avenues of attack and a crisis of staff burnout, security teams are dealing with a lot: 78% of security and IT leaders say that remote workers are harder to secure 65% of organizations have reported an uptick in attacks during the pandemic 73% within the industry have reported colleagues quitting due to burnout.

Stranger Danger: Your JavaScript Attack Surface Just Got Bigger

Building JavaScript applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome, you're a cloud native application developer! As developers, our responsibility broadened, and more software means more software security concerns for us to address.

A Partnership Protecting Critical Infrastructure: Centripetal and Dynics

Threat activity today is incredibly high, and industrial infrastructure is a primary target. Centripetal and Dynics are partnering to combine IT and OT expertise to better protect critical infrastructure and industrial control systems across the United States.