Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Access AWS RDS Databases in EKS Using Teleport Machine ID Without Passwords

At Teleport we love modern infrastructure and open-source software, but don't like static credentials and passwords. This created a challenge for us when deploying Temporal, an open-source workflow automation software on EKS: Temporal always requires a password to authenticate to the backend RDS database. To solve this problem, we turned to Teleport Machine & Workload Identity.

From Hidden to Exposed: Advanced Graylog Alerts for Malicious Activity

Think you've implemented every security measure possible? Think again. While you may have addressed many common attack vectors from both threat actors and Red Team engagements, there's always more to uncover. This session is designed to push your defenses to the next level by diving deep into the often-overlooked tactics that can significantly enhance your security posture.

Revamping Egnyte's Sharing & Permissions: A User-Centric Journey

Great product design not only boosts engagement but also improves user efficiency and productivity. At Egnyte, we understand this deeply and focus on bridging the gap between business requirements and agile feature development, ensuring a seamless user experience. The faster users grasp product features, the sooner they see a return on investment. To achieve this, we aim for intuitive and simple product design.

CRQ Model Update Increases Statistical Significance With 25,000 Trials

As a part of its ongoing commitment to providing chief information security officers (CISOs) with practicable insights that guide high-level cyber risk management decision-making, Kovrr's latest model update increases the number of yearly trials in its Monte Carlo simulation by 150%.

Proactive Threat Management: Strategies for Modern Cybersecurity

Businesses are under more and more pressure to protect their digital assets in a world where cyber risks change every day. Threat management is now an important part of modern safety because it makes sure that companies can detect, mitigate, and react to threats right away. Advanced threat protection that works not only lowers risks, but also makes businesses more resilient, so activities stay safe and don't stop.

How Growing MSSPs Benefit from Tools with Public-Cloud Pricing

This blog was originally published on MSSP Alert on October 16, 2024. MSSPs want to grow—but the complexity of modern security operations (SecOps) and the unique demands of the security services market make this challenging. In this post, we’ll look at how tools with public cloud or public cloud-like pricing—pricing that is usage- or consumption-based rather than fixed fee or license-based—can help MSSPs grow more effectively and efficiently.

Trustwave's 2025 Cybersecurity Predictions: AI as Powerful Ally for Cyber Defenders and Law Enforcement

As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. Over the next several weeks their thoughts will be posted here, so please read on and stay tuned! As we approach 2025, cybersecurity landscapes are set to evolve in unprecedented ways, with artificial intelligence (AI) taking center stage for both cyber defenders and threat actors alike.