Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing your Cloud Infrastructure with AWS

In the first instalment of "Tines, securing your cloud infrastructure" we look at two stories designed to save money and resources and close potential security gaps in your AWS environment. Our first story monitors AWS IAM access keys and automatically deactivates any that are older than 30 days. Our second story looks at automatically stopping and starting EC2 instances that may have been spun up for testing purposes.

Wallarm Demo: Orphan and Shadow API Detection

Orphan APIs can lead to a host of unnecessary issues such as misallocated resources, maintenance issues, wasted development and testing time, and issues with maintainability, scalability, security and usability. Watch this quick demo to learn how Wallarm API Discovery helps you identify and manage any Orphan APIs in your portfolio.

AI Automation Can Help, But Not Replace

Discover the symbiotic relationship between AI and human roles in business. While automation has its place, it doesn't supplant human presence. AI augments tasks, and you won't be replaced by AI but rather by someone empowered by it. Even small businesses face challenges affording AI integration. A real-world example from a solicitor's office sheds light on the reality for small to medium-sized businesses. Join the conversation about the delicate balance between technology and human touch in the modern business landscape.

IT Budgeting in Economic Downturns

Dive into the world of IT budgeting with our illuminating video! Explore how different businesses allocate resources based on revenue and spending percentages. Whether you're a tech-focused giant investing up to 20% for cutting-edge solutions or a manufacturing entity assigning 5-10% for essential IT needs, gain insights into financial strategies that drive tech investments. Uncover real-world examples, from fintech firms with comprehensive tech budgets to manufacturing companies prioritizing cybersecurity and infrastructure. Simplify IT budgeting complexities, make informed decisions, and navigate evolving tech landscapes.

Remote Browser Isolation (RBI) with Cato Networks [Demo]

Learn how quick and easy it is to secure your internet traffic using Remote Browser Isolation by Cato Networks! Cato’s Remote Browser Isolation (RBI) service provides secure browsing through a virtualization service that streams web pages safely to the user’s device. In-browser code is executed remotely, keeping users safe from threats such as ransomware and phishing. Cato RBI is also simple to set up. It is accessible in minutes with just a few clicks, unlike some competitors who require complex setup. Cato RBI requires no maintenance: there is nothing to install and nothing to patch.

How we found a prototype pollution in protobufjs - CVE-2023-36665

In this webinar excerpt, our colleague Peter Samarin demonstrates how our prototype pollution bug detectors were able to uncover a highly severe CVE in the popular JavaScript library protobufjs. This finding puts affected applications at risk of remote code execution and denial of service attacks.

Investment Amid Cheap Money

In this insightful video, we delve into the current financial landscape marked by an extended period of low-interest rates, booming exits, and the crucial need for returns on investments. With money becoming cheaper, the urgency to put it to work has never been greater. Whether you've recently made a substantial sum or have significant capital on hand, the dilemma remains the same: how to make your money grow in the face of looming inflation.