Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Imperium Markets uses Fireblocks to achieve Australia's first atomic eAUD settlement

Imperium Markets has completed Australia’s first atomic settlement, or the instantaneous swapping of an asset for payment, with the eAUD – issued as central bank digital currency by the Reserve Bank of Australia. Utilizing Fireblocks’ battle-tested tokenization technology, Imperium Markets’ pilot saw two major banks – Westpac and Commonwealth Bank – successfully issue and invest in certificates of deposit.

DevOps Speakeasy with Tracy Ragan

This episode of DevOps Speakeasy features Tracy Ragan, CEO of DeployHub and CDF board member. Ragan joins us to discuss how to secure your DevOps pipeline with new security tools. There has been a security awakening among IT teams around the world. This awakening has resulted in the release of new open source tools that you can use today. From hardening the build process to gathering actionable supply chain intelligence. Her session will review the new generation of open source security tools to incorporate into your security strategy.

Role Explosion: Rethinking Access Control

As the digital landscape expands, organizations are facing a complex challenge: managing access to an ever-growing number of resources, applications, and services. The traditional approach of using identity groups to handle access control is becoming increasingly untenable. So, let's explore the causes behind role explosion and discuss the need for a paradigm shift towards a more scalable and efficient access management strategy. ‍

The state of stateful applications on Kubernetes

Kubernetes has become one of the most popular platforms for running cloud-native applications. This popularity is due to several factors, including its ease of use and ability to handle stateless applications. However, running stateful applications, such as databases and storage systems, on Kubernetes clusters is still debatable. In other words, does Kubernetes and its containerized ecosystem provide a solid and reliable infrastructure to run such critical applications?

Snyk's Sonya Moisset on Proactive Security Measures | Developer-First Security Week

Dive into the world of software security with Sonya Moisset, a distinguished guest at the Developer-First Security Week. As a recognized expert from Snyk, Sonya brings her wealth of knowledge to the forefront, sharing insights, strategies, and best practices for building resilient and secure applications. Explore cutting-edge secure coding and ensure your software stands strong against today's evolving cyber threats.

Ensuring Data Protection for Third Parties: Best Practices

When a company contracts or partners with a third party to handle and process its sensitive customer data, it is crucial for those third parties to use effective strategies to safeguard that data. Third parties should treat the data they handle from organizations as their own, complying with regulations and security requirements set by the organization.

[New Product] Supercharge Your Anti-Phishing Defense with KnowBe4's PhishER Plus!

Staying one step ahead of cybercriminals is absolutely vital in today’s threat landscape. That's why we're thrilled to introduce PhishER Plus, a revolutionary product from KnowBe4 that takes your anti-phishing defense to a whole new level. Phishing attacks remain the top cyberthreat out there. It's tough to keep up with the ever-evolving techniques of bad actors.