Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is a Cloud Security Assessment? (and How to Perform One)

Compared to on-premises data storage, cloud computing comes with a lot of benefits. On-demand access to company data, flexibility, and fast collaboration are just a few. But along with these advantages come increased security risks. To manage them, companies should invest in regular cloud security assessments.

Cisco Acquires Isovalent: A Big Win for Cloud-Native Network Security and a Validation of Tigera's Vision

This week’s news of Cisco’s intent to acquire Isovalent sends an important message to the cloud security ecosystem: network security is no longer an afterthought in the cloud-native world. It’s now a critical component of any robust security posture for cloud-native applications. This move not only validates the work of the Isovalent team in evangelizing this essential category but also underscores the vision Tigera has pioneered since 2016 with Project Calico.

Understanding the 4 Types of Network Monitoring Tools and Comparing Available Solutions

Today, IT networks are the backbone of nearly every business. Simply put, if your network isn’t performing at its best, the flow of data and services will be impeded, and your business operations will suffer. This modern reality makes effective server and network monitoring software not just a technical necessity but a business imperative.

15 Essential Network Protection Best Practices You Need to Know

By 2025, experts predict that cybercrime costs will balloon past $10.5 trillion. This proves the pressing need for people and organizations to protect their networks, data, and sensitive information. Most hackers compromise and steal data through unauthorized network access. Simply put, keeping your network unsecured is begging for threat actors to gain access and wreak havoc. In this guide, we'll explain all the steps you need to follow to keep your networks safe.

Cracking the Code: How to Identify Devices via MAC Addresses Online

Did you know that each device on a network has a unique MAC address? This ID allows us to identify devices quickly in the digital world. MAC addresses help us keep networks safe, manage devices efficiently and address issues as quickly as possible.

5 Tips for Better Kubernetes Network Security Policy Design for Workloads

The surge of cloud-native applications has propelled Kubernetes into the forefront, revolutionizing how we manage and deploy workloads. However, this exponential growth has also increased the security challenges, and attack surface, DevOps and Security teams must address. As we discussed in a previous blog post, traditional network security measures fall short when presented with Kubernetes’ dynamic nature, demanding a paradigm shift towards more adaptable solutions.

Can Firewalls Be Hacked? Yes, Here's 6 Vulnerabilities

Like all security tools, firewalls can be hacked. That’s what happened to the social media platform X in January 2023, when it was still Twitter. Hackers exploited an API vulnerability that had been exposed since June the previous year. This gave them access to the platform’s security system and allowed them to leak sensitive information on millions of users. This breach occurred because the organization’s firewalls were not configured to examine API traffic with enough scrutiny.

14 Step Checklist for a Flawless Network Security Audit

If security policies aren’t periodically updated to meet modern threat demands, organizations risk introducing vulnerabilities into their IT security posture. Comprehensive audit reports help security leaders gain in-depth visibility into their organization’s cybersecurity strategy and assess the resilience of its network infrastructure.

SafeNet: Securing Your Network From Yourself

Whether working at home or in the office, when conducting cybersecurity research, investigating the dark web forums or engaging with any dangerous part of the internet, staying safe is critical. While most researchers use a virtual machine to mitigate risks to the host PC, there is an overlooked and unprotected attack surface: the network. This post will illuminate potential risks and introduce a new solution to keep your network safer without hindering your workflow.

What you can't do with Kubernetes network policies (unless you use Calico): Advanced policy querying & reachability tooling

In my previous blog post, What you can’t do with Kubernetes network policies (unless you use Calico): Policies to all namespaces or pods, I talked about this use case from the list of nine things you cannot implement using basic Kubernetes network policy — policies to all namespaces or pods. In this blog post, we’ll be focusing on the next use case — advanced policy querying and reachability tooling.