Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Coffee with Jim - Securing Against Supply Chain Cyber Attacks

Following the ransomware attack on US IT firm Kaseya, join us for a chat about the ever-increasing need to secure ourselves successfully against not only direct ransomware attacks, but those that affect us through our supply chains. An estimated 200+ firms have been crippled by the attack on Kaseya, simply because they use Kaseya’s software. The implication of this is that it can feasibly happen to any aspect of your supply chain, so if cyber security is not high on your board’s list of priorities, it really should be. How could the attack on Kaseya, and other supply chain attacks, have been avoided? How can you reduce the probability of it happening to your own organisation? And crucially, how can you make the solution cost effective?

Securely Deploy Kubernetes Clusters with Teleport Machine ID and GitHub Actions

Current approaches to managing machine identity for infrastructure like Kubernetes Clusters and CI/CD workflows rely on outdated security mechanisms like passwords, shared secrets, and other manual processes that are error prone and increase the risk of breach.

Store & manage secrets like API keys in Python - Tech Tip Tuesdays

In this video, we explore how to securely manage secrets like API keys, passwords, credential pairs, and other sensitive information in python. We run through the basics of using environment variables and move onto more advanced senarios such as managing different secrets for multiple environments.

Silicon Valley Bank Fallout - Arctic Wolf News Break

Silicon Valley Bank (SVB) experienced a rapid implosion last week. While many are discussing the immediate financial impacts to bank accounts and the larger impact on banking in general, it’s important to note that there will likely be a secondary impact. Learn what individuals and customers of SVB should be expecting from a cybersecurity perspective. Learn how Arctic Wolf can help prepares your employees to recognize and neutralize social engineering attacks and human error—helping to end cyber risk at your organization.

Free Phishing Security Resource Kit

Phishing emails increase in volume every month and every year, so we created this free resource kit to help you defend against attacks. Request your kit now to learn phishing mitigation strategies, what new trends and attack vectors you need to be prepared for, and our best advice on how to protect your users and your organization.