Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Continuous Cyber Monitoring and Rating with SecurityScorecard

At Infocom Security Greece virtual event on April 23, 2021, Nadji Raib (Regional Sales Director, SecurityScorecard), Matthew McKenna (President of International Sales, SecurityScorecard), and Panagiotis Pierros (Managing Director, TICTAC LABORATORIES) presented how important it is not only to monitor your own security posture but also to monitor your 3rd party, 4th party, and your entire ecosystem of vendors and partners. The demo section shows how easy it is to instantly rate a company's current security posture and to prioritize what are the issues that need to be fixed to get a better security rating.

Devo Customer Story: Panda Security

Watch this customer story to see how Panda Security, an endpoint protection company, leverages Devo to rapidly collect and analyze a wide range and large volume of security data. Devo offers Panda a SaaS-based security analytics solution that easily scales to meet its growing customer base. Panda seamlessly integrates Devo into its own products, providing customers out-of-the-box analytics and insights, freeing Panda to focus on what it does best, malware detection.

Dynamic Observability: Troubleshooting Techniques for 2021

A new generation of troubleshooting techniques are making their way into the mainstream. These techniques make observability more dynamic, configurable, and intuitive. In this webinar, we discussed the importance of these new techniques, how they enable you to solve customer issues faster and increase your velocity.

How to prevent OWASP API Top 10 security vulnerabilities? API attack prevention

Broken object level authorization Broken user authentication Excessive data exposure Lack of resources and rate limiting Broken function level authorization Mass assignment Security misconfiguration Injection Improper assets management Insufficient logging and monitoring Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

Kubernetes Quick Hits: Use SecurityContext to run containers with a read-only filesystem

In this episode of our Kubernetes Quick Hits video series, Eric Smalling–Sr. In less than four minutes, you’ll learn how to use the readOnlyRootFilesystem control to keep your containers immutable and safe from modification by hackers and misbehaving code. Snyk helps software-driven businesses develop fast and stay secure. In addition to container security scans, Snyk can continuously monitor to find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.

Shifting security left while building a Cloud Native bank

Building a digital bank requires a unique combination of agility and speed while maintaining the highest level of security. Lunar, a digital challenger bank in the Nordics, has always had technology and agility as a differentiator. Lunar was built for the cloud, with Cloud Native principles, such as microservices, containers, and container orchestration amongst others. In this presentation Kasper will present some insights into the principles on which the Lunar infrastructure was built on, the continuous focus on security, and how application security is shifting left and becoming a developer concern.

12 - Using the new Connect Web Services (1.5+)

The new Connect Web Service feature is available in 1.5.0 provides the ability to retrieve or update custom host properties defined in the App and potentially trigger any Forescout Action based on the value of these properties. Watch this video to gain a hands-on understanding of how to leverage this feature in your App.

Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors

This webinar was recorded and co-hosted with MAGNET: The Manufacturing Advocacy and Growth Network. As the NIST and Ohio MEP program advocates, MAGNET has invited a leader of their technological and educational cybersecurity partners, Ignyte Assurance Platform and Ignyte Institute, for a conversation on how to get on board with the emerging Cybersecurity Maturity Model Certification (CMMC).