Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

3 Tips to Strengthen AWS Container Security

If you’re building an application, you want to ensure it’s reliable, consistent, and rapidly deployable in any cloud environment. That’s what containers are used for — packaging instructions into a digital object for reuse. Without them, you’ll struggle to run some application components from server to server. But when you deploy containers, there are security risks that you should be aware of and can mitigate.

TFiR Let's Talk! Recovery of Velero Backups to AKS & EKS

Sebastian Glab, Cloud Architect at CloudCasa, shows you how CloudCasa for Velero allows Velero users to manage their cluster using our software as a service platform. By plugging directly into Velero, CloudCasa provides user friendly, intuitive UI for Kubernetes cluster management utilizing Velero as the backup tool. Users can centrally manage their current backups and configuration across multiple clusters and cloud providers (AKS, EKS and GKE) in one place. They don't have to jump across different environments, access different clusters to see what's going on, they can simply go to Cloud Casa, and manage everything from there.

What is SaaS? Hint: It Doesn't Mean "Cloud"

The U.S. federal government is committed to implementing zero-trust cybersecurity across all government agencies. In 2021, the White House issued Executive Order (EO) 14028, directing federal agencies to adopt zero-trust network architectures. A few months later, CISA followed up with a draft Zero Trust Maturity Model.

Curating Open source Libraries on JFrog Platform, part II.

Software supply chain security has been the most widely discussed topic for anyone who is writing applications utilizing the majority of open-source or third-party libraries. This webinar will showcase JFrog Platform's abilities to curate and compose workflows to help isolate libraries that have vulnerabilities and promote libraries to repositories that can be safely used. This webinar will also demonstrate self-service curation workflows.

AI, Cybersecurity, and Emerging Regulations

The SecurityScorecard team has just returned from an exciting week in San Francisco at RSA Conference 2023. This year’s theme, “Stronger Together,” was meant to encourage collaboration and remind attendees that when it comes to cybersecurity, no one goes it alone. Building on each other’s diverse knowledge and skills is what creates breakthroughs.

Crypto is Being Stolen Via Compromised AT&T Email Accounts

Communications company AT&T offers email services to many of its customers. Those emails have recently been compromised by way of an interesting exploit that is costing customers millions of dollars in stolen cryptocurrency. AT&T customers are having their email accounts attacked, and those exploited email accounts are being used to steal additional data and to access cryptocurrency exchange accounts, which is a very serious issue for the impacted users.