Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

EP 68 - Cloud Security, Collaboration and Futuring in the Now

In this episode, Trust Issues host David Puner wraps up 2024 with a conversation with Red Hat’s Field CTO Ambassador E.G. Nadhan about the future of cybersecurity. They discuss the importance of cloud security principles, the impact of emerging technologies like AI and quantum computing, and the challenges of managing machine identities.

CIO POV: Beware of Deepfakes Infiltrating the Enterprise

Many years ago, the philosopher Phaedrus said, “Things are not always what they seem; the first appearance deceives many; the intelligence of a few perceives what has been carefully hidden.” He couldn’t have possibly imagined today’s world, yet his warning encapsulates deepfakes, one of the greatest threats of modern times. As AI advances, digital disinformation is blurring the lines between fact and fiction.

Teach Yourself Kubiscan in 7 Minutes (or Less...)

While Kubernetes’ Role-based access control (RBAC) authorization model is an essential part of securing Kubernetes, managing it has proven to be a significant challenge — especially when dealing with numerous users and pods. Fortunately, KubiScan is here to help address this issue.

Cloud Security Audits Explained: Challenges and Solutions

The cloud has enabled faster, more reliable and more scalable software delivery for organizations. Alongside these improvements come greater complexity and security considerations, all of which have implications when preparing for cloud security audits. Like all security audits, cloud security audits help ensure that data is kept safe from unauthorized access and theft.

Identities Do Not Exist in a Vacuum: A View on Understanding Non-Human Identities Governance

The future of eliminating secrets sprawl means getting a handle on the lifecycles and interdependencies of the non-human identities that rely on secrets. Learn how to implement these NHI security measures at scale.

Navigating Australia's Cyber Landscape: IAM, PAM, and the Essential Eight Framework

In this webinar recording, explore how Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions empower organizations to achieve compliance with the Essential Eight framework, bolstering cybersecurity in the Australian landscape. What you’ll learn: How IAM and PAM support Essential Eight compliance. Real-world examples of strengthening cybersecurity. Insights into streamlining access management. Live Q&A highlights with industry experts.

Teleport Identity & Policy: Deep Technical Dive with Xin Ding

As digital environments expand, the challenges of protecting critical infrastructure continue to grow. Join us in this insightful discussion as we dive into the complex landscape of cybersecurity. This video explores key industry trends, major threats to infrastructure, and actionable strategies for improving security.