Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A SaaS Multi-Cluster Manager for Velero

Welcome to another video on CloudCasa for Velero: A SaaS Multi-Cluster Manager for Velero backups. In this video, Martin Phan, Field CTO for CloudCasa, will show you the first-hand look of the integration that CloudCasa has with Velero and its centralized GUI that helps users manage and monitor their Velero-based backups. You will find out how CloudCasa for Velero is able to aggregate data across multiple Kubernetes clusters across all hybrid and cloud environments. If you are using Velero today, please check this demo on CloudCasa for Velero and learn more about its multi-cluster management functionality and full stack recovery capabilities using the intuitive GUI.

Ad-Hoc Job Runs and Creating backup and Restore Custom Resources for Velero

Welcome to another video on CloudCasa for Velero, in which Martin Phan, Field CTO for CloudCasa, will show you how you can easily form Ad hoc job runs for Velero in CloudCasa. He will also demonstrate how you can create backup and restore Custom Resources in CloudCasa for Velero and get notifications directly from the CloudCasa service that is running within Velero. Through functionality already native to CloudCasa such as full stack recovery, email alerting and role-based access control, CloudCasa for Velero can be that single pane of glass to manage and report on all your Velero installations throughout your enterprise. So do give CloudCasa for Velero a try and do let us know what you think.

The New UK Telecommunications Security Act: What It Means For You

Back in November 2020, the UK Telecommunications (Security) Act started its journey through the Houses of Parliament, and after many readings and much consultation it finally went live almost two years later on the 1st October 2022. At the heart of the Act was a desire to improve the security posture of the UK’s telecoms networks, infrastructure, and organisations, recognising the importance of telecommunications as part of the UK’s critical national infrastructure (CNI).

Six Key Considerations When Deploying a Web Application Firewall

839 million attacks ranging from DDoS and bot to Zero-day and OWASP Top 10 attacks were recorded on the AppTrana WAF on just 1400 web and API applications. So, implementing WAF as a first layer of defence is a no-brainer. That said, dozens of established start-ups operate in this space, and choosing a WAF provider can be daunting. It is essential to consider various factors to ensure the selected WAF meets your organization’s unique needs and requirements.

Securing private applications with CrowdStrike Zero Trust Assessment and AWS Verified Access

AWS Verified Access (AVA), a feature of Amazon Virtual Private Cloud (VPC) networking, delivers secure, zero-trust access to private applications without a VPN by continuously evaluating each request in real time based on contextual security signals like identity, device security status and location. The service grants access based on the security policy configured for each application and then connects the users, thereby improving the security posture of the organization.

New CrowdStrike Falcon Fusion Features Refine Workflow Automation for CrowdStrike Customers

CrowdStrike Falcon® Fusion is a cloud-scale, extensible security orchestration, automation and response (SOAR) framework that’s natively integrated with the CrowdStrike Falcon® platform and available to CrowdStrike customers at no added cost.

The 443 Podcast, Ep. 236 - Another Software Supply Chain Attack

This week on The 443, Corey Nachreiner and Marc Laliberte discuss the latest software supply chain attack with a potential blast radius of thousands of organizations. They then cover a new protocol vulnerability in the Wi-Fi wireless standard before ending with some research into insecure Microsoft Azure applications.

How to Improve Your SOC's Cyber Vulnerability Awareness

The cybersecurity threat landscape is rapidly evolving as cloud computing, the Internet of Things (IoT), mobile devices, and remote work become more widely adopted. As a result, Security Operations Center (SOC) teams are increasingly overwhelmed. In addition to responding to cyber threats, teams must continuously identify emerging vulnerabilities and move quickly to apply and test patches and updates. A failure to do so significantly increases cyber risk. Consider the statistics.