Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Kubernetes Quick Hits: Don't run with privileged:true in you Kubernetes SecurityContext

In this episode of our Kubernetes Quick Hits video series, Eric Smalling–Sr. Developer Advocate at Synk– talks about privileged mode containers and why, for the vast majority of us, it’s simply a bad idea as well as some ideas for finding and preventing its use. Privileged mode is part of item number five from our recently published cheatsheet, 10 Kubernetes Security Context settings you should understand, check it out and start securing your Kubernetes application deployments today!

Life Sciences Data Management and Compliance

Learn how Egnyte for Life Sciences helps leading biotechnology, medical device, and drug development companies innovate faster through seamless compliance and unified document management. This overview video showcases how Egnyte's data privacy, GxP compliance, audit, eTMF, workflow, and Quality documentation products help Life Sciences companies connect globally distributed teams and protect their content.

Securing the Supply Chain

This webinar was hosted by Ignyte Assurance Platform and MAGNET: The Manufacturing Advocacy and Growth Network. How to protect your assets from cyber threats and attacks Guidance on the latest and necessary cybersecurity requirements and legislations Find out what your business needs to comply with and what it takes to get there in the shortest possible time Learn what’s the most efficient way to maximize your efforts and resources in cybersecurity

Freeze policy - Make your private registry read-only to prevent changes

Guide on how to use Bytesafe Freeze policy to control the open source software versions to what's available in an npm registry. Want to get consistent results when using npm install? Use Freeze and lock available dependencies to the ones you selected and approved. Consistent results, regardless of who runs the installation of dependencies, when in time and regardless of the environment or system.

Detecting and Investigating Threats in Splunk Security Analytics for AWS

Splunk Security Analytics for AWS’s pre-built, AWS-specific detections and dashboards allow you to easily visualize your AWS environment and centralize your security analysis and investigations. We’ll walk through some of the offering’s key dashboards and detections in this video, as well as the investigation interface.