Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security That Lets People and Businesses Prosper

Lookout believes that data security is not just about locking down sensitive information. It’s about setting it free. By giving businesses and individuals greater control over their data, we unleash its value. Everyone can connect and work effortlessly, without worrying about exposure. At Lookout, we’re creating the future of data security. That’s prosperity and peace of mind for all. To learn more, visit Lookout: bit.ly/3PcUTtZ

Under the Wing: Taking on Patch Tuesdays with Falcon Spotlight

Microsoft’s Patch Tuesday is dreaded by every security team. With dozens of new patches inundating your team every month, how do you know which to prioritize? CrowdStrike combines the power of our world-class machine learning and our unparalleled intelligence to arm every customer with the insight they need to prioritize patches and take action. In this Under the Wing episode, you’ll learn how CrowdStrike enables you to protect your organization with Falcon Spotlight.

The 443 Episode 226 - Report Roundup

This week on the podcast, we cover key findings from three individual reports published last week. In the first report we'll dive into the world of blockchain analysis looking for illicit transactions. In the second report, we'll cover the state of SMB security. The final report includes a discussion of overall financial crime involving stolen payment card information. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Automating Kubernetes Backups with CloudCasa REST APIs

For power users who want to run their scripts from the command line or use workflow automation tools to provision their environments, watch this short tutorial on how to use the CloudCasa REST API to manage Kubernetes backups. The tutorial goes through an example of executing a CloudCasa backup job through the REST API, which requires tasks such as querying for backup job ids and invoking an action against that job through an http request.

[Webinar] How You Should Not Remediate Your Hardcoded Secrets

If you have ever run a secrets scanner against your entire codebase, it has likely raised hundreds if not thousands of findings, leaving you wondering, "Where should I start?" Unlike other vulnerabilities, hardcoded secrets represent a threat by themselves whether your code is running or not. Attackers with access to a repository will scan it inside out for secrets, turning every occurrence into a risk you cannot ignore. Still, this does not mean that you should treat all incidents equally!

Quanta Services Protects Privilege In Over 200 Subsidiaries | CyberArk

Quanta is a specialized contracting services company that delivers comprehensive infrastructure solutions for the utility, renewable energy, communications, pipeline, and energy industries. Founded in 1997 when four companies merged, Quanta has grown to become a $12 billion organization. See how CyberArk helped them enhance their security and reduce demand on IT teams.

Healthfirst Applies An Identity Security First Approach To Implement Zero Trust | CyberArk

Healthfirst’s unique advantage is to put members first by partnering closely on shared goals with its broad network of providers. Healthfirst is also a pioneer of the value-based care model, where hospitals and physicians are paid based on patient outcomes. See how CyberArk helped them reduce security costs with solutions like federated identity control.

Brazilian Judiciary Partners With CyberArk To Implement Intelligent Privilege Controls | CyberArk

Unpredictable, complex and urgent cybersecurity threats remain the principal concern for businesses from the largest enterprises to the newest start-ups. In Brazil, an effort to update and streamline the justice system demanded a fresh look at security, and identity management. See how CyberArk helped them reduce the area off attack of for their endpoints.

Turkcell Protects Millions Of Customers With CyberArk| CyberArk

Emre Tanrıverdioğlu has a daunting task. As the Identity and Management Operations Manager at Turkcell, he is charged with to protecting 40 million customers across Turkey, Ukraine, Belarus and Northern Cyprus. In addition, he needs to safeguard 300,000 network devices and 40,000 employee and partner identities. See how CyberArk helped them reduce the area off attack of for their endpoints.