Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Falcon Cloud Security Kubernetes Admission Controller: Demo Drill Down

Misconfigured containers with root access are commonly deployed in cloud environments, leaving organizations vulnerable to adversaries. See how Falcon Cloud Security Kubernetes Admission Controller provides out of the box policies to prevent misconfigured containers from deploying, ensuring cloud environments are secured and compliant.

Falcon Exposure Management Active Asset Scanning: Demo Drill Down

Organizations often grapple with hidden network vulnerabilities akin to navigating an unseen, complex labyrinth. Falcon Exposure Management alleviates this challenge, transforming obscured vulnerabilities into visible, managed, and secured assets through its Active Asset Discovery feature. It employs customizable, non-intrusive scans, ensuring that every asset is mapped without disrupting operations. In this demo, experience the revelation of every network corner, unveiling a fortified defense ready to counter cyber attacks.

OAuth security gaps at Grammarly (now remediated)

This short video explains how Salt Labs researchers identified several critical security flaws on the popular site - Grammarly. The flaws were found in the site's authentication functionality and could have allowed a malicious attacker to take over user accounts, access profile information, and take actions on behalf of the user. All issues were reported to Grammarly and have been resolved with no evidence of these flaws being actively exploited in the wild. In the research, they also found similar vulnerabilities in Vidio.com and Bukalapak.com.

The 443 Podcast - Episode 265 - CISA's Secure by Design Whitepaper

This week on the podcast, we cover CISA's newly updated whitepaper on guidance for both software manufacturers and customers on the principals of secure-by-design and secure-by-default. Before that, we cover the Cisco IOS XE vulnerability that is under active exploitation in the wild, give an update on the EPA's efforts to regulate cybersecurity practices in water districts, and then discuss research into the latest "bullet proof hosting" options for malicious web content.

Network Penetration Testing: Common Vulnerabilities, Benefits, and Cyphere's Expertise

Welcome to our latest video, where we explore the world of Network Penetration Testing Services. In this video, we dive into what Network Penetration Testing is, common vulnerabilities you must watch out for, and its multiple benefits. Discover how Cyphere, your trusted cybersecurity partner, can assist you in fortifying your network's security through expert Network Penetration Testing services.

Friday Flows Episode 11: Respond to & configure Terraform Cloud run task

The question of the week from a customer was: “How do we use Tines with our Infrastructure-as-Code methodology?” Today we’re looking at how to automate processes around Terraform Cloud, like documentation, opening tickets, and getting approval for changes in the cost of the infrastructure. Use this workflow to save time, maintain consistent records for audits, and manage incremental infrastructure costs.