Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vulnerability Assessment Using Datadog and Snyk

Vulnerability assessment for teams can often be overwhelming. This joint Datadog and Snyk session demonstrates the new integration between the two companies, which enables developers to precisely identify and prioritize code-level security fixes in production applications. Using a sample Java application, you'll see how Snyk surfaces vulnerability information at runtime inside the Datadog UI to help users triage fixes by not just seeing that a vulnerability exists but also how often they are exposed.

Microservices, Containers and Kubernetes in 10 minutes

What is a microservice? Should you be using microservices? How are microservices related to containers and Kubernetes? If these things keep coming up in your day-to-day and you need an overview in 10 minutes, this blog post is for you. Fundamentally, a microservice is just a computer program which runs on a server or a virtual computing instance and responds to network requests.

A Look at the Legal Consequence of a Cyber Attack

Is your system 100% ready to face the severest cyber-attack and mitigate the risk of a possible data breach? If you are unsure about your cyber-safety structure, then it’s time to upgrade it. Otherwise, you could be at risk of lengthy legal battles that result in hefty fines. Beyond that, the cost in terms of reputational loss could be catastrophic if not handled meticulously by professionals within a reasonable time.

Fulcrum Therapeutics - A Single Repository For Collaboration, Compliance, and Control

Chris Moxham, Ph.D., is the Chief Scientific Officer at Fulcrum Therapeutics, an innovative biotech addressing the causes of genetically defined disease. By developing treatments that address the root cause of disease, Fulcrum goes a step further than creating therapies that just manage symptoms and develops treatments that alter the genetic expression of disease, enabling life-changing outcomes.

NIST Cybersecurity Framework - The Key to Critical Infrastructure Cyber Resiliency

In the digital age, organizations and the missions and business processes they support rely on information technology and information systems to achieve their mission and business objectives. Not only is technology used to efficiently enable businesses to carry out operational activities, but it is also the backbone for the United States’ critical infrastructure.

4 Steps for Assessing Your NERC CIP Compliance Program

The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) Standards are a cybersecurity compliance framework designed to protect utility organizations. Adhering to these guidelines is essential—falling short will leave your environment vulnerable to malicious actors and can result in some hefty fines.

What is an Open Port? Port Scanning, Risks and Monitoring.

Port scanning is the critical element of any cyber risk assessment conducted under infrastructure security or network security domains. It helps to identify all the exposed services on a system or network. Presence of open ports doesn’t indicates importance from attack perspective only; they are equally vital from a defensive front.

The Keys to a Zero Trust Strategy

Zero Trust is a security strategy you need to implement and scale across many different tools and layers. It is super complex to do so. The reason is that you have many kinds of networks, a vast number of data planes, and places for things to connect. On top of that, you also have many types of devices that connect. How can you get one single view of all these assets, get everything into a single layer and figure out one policy that can manage them all? In this video, Rob McNutt discusses the keys to a Zero Trust security strategy.