Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Enabling Self-Service Recovery in a Multi-Tenant Kubernetes Environment with CloudCasa and Capsule

At KubeCon Europe 2022, we held a virtual booth office hour session with our new partner Clastix. In this video, Dario Tranchitella, the lead architect for Capsule by Clastix discusses and demonstrates how the combination of Capsule and CloudCasa provides easy self-service backup and recovery in a multi-tenant Kubernetes environment.

Spotlight on Technology - Governance, Risk & Compliance

Today we are talking all things GRC with Megan Brown at LogicGate, including why it's essential to have a robust GRC tool in a modern security stack. GRC is extremely useful for compliance framework management and maintaining compliance - it can be used effectively to supply a historical database of known risks, issues and security measures that can be used to continuously improve security intelligence. Join Megan and Razorthorn MD James Rees to find out how a good GRC tool can save you both time and money, while efficiently improving your security and compliance.

Human activated risk is real

Human activated risk is real for every organization Whether it’s introduced through coercion by bad actors, human error, or malicious intent, human activated risk is a problem that keeps getting worse. Organizations need intelligent technology that can stop the sophisticated phishing attacks that continue to evade native security defenses, as well as outbound email risk which is too often underestimated.

How Malicious NPM Packages Make Your Apps Vulnerable

Zbyszek Tenerowicz (a.k.a. ZB) teaches us how we can be susceptible to malicious packages as developers. We also see demos on the possibilities of what a malicious package can do such as modify code, package.json publish scripts and more. You're sure to learn something new in this session and level up your Developer security skills. This was a recorded livestream titled "My NPM Package Will Eat Your Lunch".

Zero Trust Network Access (ZTNA) - Cloud Security Solutions from Lookout

Lookout ZTNA is a cloud-native security solution that addresses the challenges of the modern-day remote workforce by granting access only to specific applications rather than an entire network. This limits lateral movement when a threat occurs and allows for secure collaboration across teams.

Trustwave and Microsoft Defender for Endpoint Integration

Trustwave Managed Detection and Response services integrate with Microsoft Defender for Endpoint to take containment, eradication, and recovery actions directly on the endpoint, delivering a streamlined experience for the end users. For further information on how to truly integrate your cyber defense team with industry-leading services and technologies, watch our overview of how Trustwave partners with Microsoft.

Trustwave and Microsoft Sentinel Integration Video

Scale your organization’s cyber defense program by harnessing the power of industry-leading Trustwave Managed Detection and Response services by leveraging industry-leading Microsoft Sentinel. In this brief video overview, we cover: View the video for further insight into the partnership of Trustwave and Microsoft.

Raising SIEM awareness and securing enterprise endpoints with Joseph Steinberg

In this episode of ManageEngine Insights podcast, we'll explore various security concerns arising in enterprises and elsewhere. Enterprises need to consider both bottom-up and top-down approaches, as well as a wide variety of hardware and software-based security measures.

PCI DSS 4 0 Requirements Explained

PCI DSS 4.0 update has made a huge buzz in the industry post its release. Organizations are still scrambling to understand the changes introduced and learn about the requirements of PCI DSS. So, explaining the updates and the PCI requirements in detail VISTA InfoSec conducted an informative webinar on ”PCI DSS 4.0 Requirements Explained”. Watch the video and gain insight into the key updates introduced by the PCI Council.