Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Shira Rubinoff at Blackhat with Israel Mazin, CEO and Chairman of Memcyco

Amidst the electric atmosphere of the Black Hat conference, where cybersecurity luminaries converge to explore cutting-edge innovations, a spotlight shone on Memcyco's CEO, Israel Mazin. In a recent interview captured on film, Israel Mazin engaged in a dialogue with tech influencer and member of our advisory board, Shira Rubinoff. Together, they delved deep into Memcyco's paradigm-shifting product solutions that are challenging the status quo of the threat intelligence landscape.

Automatic Application Protection using Red Hat Advanced Cluster Management with Trilio

See how easy it is to protect a newly deployed application into OpenShift using Red Hat Ansible Automation Platform, followed by an ACM Policy written for Trilio that will auto protect the deployed application (create a backup, according to the policy)

Hands-on guide to Runtime Security for CI/CD Pipelines with StepSecurity

In this webinar, we are joined by Varun Sharma and Ashish Kurmi, founders of StepSecurity. StepSecurity is a pioneer in runtime security for CI/CD pipelines. Given that CI/CD is a high-privileged environment that builds release artifacts and has admin cloud credentials, there has been an increase in attacks on CI/CD pipelines. The importance of CI/CD Security has been underlined by recent guidance from the Cybersecurity & Infrastructure Security Agency (CISA) and the National Security Agency (NSA)

Unparalleled Cloud Visibility in Action with Sysdig's Enhanced Searchable Inventory

Discover how Sysdig’s "Improved Inventory" can help you find your way inside your ever-growing cloud infrastructure with minimal effort. With Inventory, navigating the intricate network of your cloud resources becomes not just manageable, but intuitive. It provides a seamless interface that marries comprehensive visibility with dynamic searchability, making it the cornerstone of effective cloud security posture management.

Strengthening Your Security with Agentless Vulnerability Management

Discover how Sysdig Secure’s new “Agentless Vulnerability Management” approach helps you streamline the onboarding of new deployments, while significantly cutting down complexity and setup time. Agentless security tools generally rely on leveraging existing interfaces and APIs provided by the cloud service providers to collect information and perform vulnerability assessments.