Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sysdig integration with Backstage

Developers are frequently tasked with working with multiple tools in the cloud-native era. Each of these tools plays a crucial role in the application life cycle, from development to deployment and operations. However, the sheer variety and diversity of these tools can increase the likelihood of errors or the accidental inclusion of critical vulnerabilities and misconfigurations.

Using Insight to Seize the SASE Opportunity

In today’s hybrid working environment, the software as a service (SaaS) apps employees use, and security service edge (SSE) solutions organizations use to secure it are dynamic and distributed. You sometimes need to deal with complex user experience issues without clear visibility into where they originate. Let’s take a look at some increasingly common situations and explore some proven ways IT leaders are regaining control.

Evasive Phishing Kits Exposed: Cato Networks' In-Depth Analysis and Real-Time Defense

Phishing remains an ever persistent and grave threat to organizations, serving as the primary conduit for infiltrating network infrastructures and pilfering valuable credentials. According to an FBI report phishing is ranked number 1 in the top five Internet crime types. Recently, the Cato Networks Threat Research team analyzed and mitigated through our IPS engine multiple advanced Phishing Kits, some of which include clever evasion techniques to avoid detection.

Australia's Cost of a Data Breach in 2024

Australia’s Data Privacy Landscape is EVOLVING QUICKLY In February 2023, the Australian government released the results of a two-year review of the 1988 Data Privacy Act. This was followed by a response in September, authored by Attorney General Mark Dreyfus, that agreed to 38 of the 116 recommendations and a further 68 ‘in principle’.

8 Essential Cybersecurity Topics

The importance of security awareness It’s well worth taking the time to craft a meaningful and engaging security awareness program. By presenting the right mix of information to your users in a compelling way, you can empower them to help you improve your organization’s security posture as well as create a more robust security culture overall. The cybersecurity topics that you include in your program should be relevant to your business and industry, of course.

Best Cloud IAM Open Source Tools in 2024

At AWS Re:Invent 2021 in the keynote address, AWS CTO Werner Vogels, invested a significant chunk of time in zooming in on the Identity and Access Management (IAM) of what he called the Everywhere Cloud. He emphasized that while often being underestimated or overlooked - IAM, remains a critical aspect of our overall security posture. ‍ ‍

How to Build a Cybersecurity Awareness and Training Program

Cybersecurity professionals possess many tools to reduce risk. However, it is no accident in a field so concerned with technology that technological tools are often prioritized over others: as the Law of Instrument says, “if the only tool you have is a hammer, it is tempting to treat everything as if it were a nail.” Therefore, cybersecurity professionals should not neglect the other tools, such as awareness and training.

Step by Step Migration Guide: AKS Clusters to Azure Linux Using CloudCasa

CloudCasa by Catalogic can be installed on Azure Kubernetes Service (AKS) clusters using Ubuntu and perform migrations to Azure Linux as the host operating system. The Azure Linux container host for AKS is a lightweight, secure, and reliable OS platform optimized for performance on Azure.

Google Gemma and PyRIT - This Week in AI

In a groundbreaking move, Google has introduced Gemma, a new open-source AI model that aims to revolutionize AI application development for developers. Developed using the cutting-edge technology underpinning Google's Gemini AI models, Gemma is set to provide developers with advanced tools to create AI applications conscientiously and efficiently.

Security Week 2024 wrap up

The next 12 months have the potential to reshape the global political landscape with elections occurring in more than 80 nations, in 2024, while new technologies, such as AI, capture our imagination and pose new security challenges. Against this backdrop, the role of CISOs has never been more important. Grant Bourzikas, Cloudflare’s Chief Security Officer, shared his views on what the biggest challenges currently facing the security industry are in the Security Week opening blog.