Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing containers on Amazon ECS Anywhere

Amazon Elastic Container Service (ECS) Anywhere enables you to simply run containers in whatever location makes the most sense for your business – including on-premises. Security is a key concern for organizations shifting to the cloud. Sysdig has validated our Secure DevOps platform with ECS Anywhere, giving AWS customers the security and visibility needed to run containers confidently on the new deployment model.

Expanding the Netskope-Microsoft Relationship: Microsoft Intelligent Security Association

Netskope is proud to be a member of the Microsoft Intelligent Security Association! We provide adeep and effective ability to leverage the Microsoft Azure Information Protection (AIP) and Microsoft Information Protection (MIP) feature sets available to E3 and E5 customers who are connecting not only to Microsoft cloud services, but to a wide range of non-Microsoft cloud storage solutions and Internet services.

The Right Steps to SASE: Gain Awareness and Visibility

The following is an excerpt from Netskope’s recent book Designing a SASE Architecture for Dummies. This is the second in a series of seven posts detailing a set of incremental steps for implementing a well-functioning SASE architecture. The first step in solving any problem is admitting there is one.

Overcoming The Challenges Of Selecting An Insider Threat Detection Tool

In a crowded market with so many new products being released, it can often be hard to make sure you're getting the right tool for your organization's security needs. Purchasing an Insider Threat Detection tool for your organization requires extensive research, which can be very time-consuming.

Tripwire Tips and Tricks: Five Things to Do With MITRE ATT&CK

In this session of the Tripwire Tips and Tricks series, you'll learn how to use the MITRE ATT&CK framework to protect your organization from cyberattacks. Tripwire Security Researcher David Lu will walk you through five key use cases for the framework, helping you deepen your understanding of mapping defensive controls to the framework, threat hunting, incident response, and more.

Code Blue: Healthcare Security in the Age of 5G and Remote Work

Last year was an especially stressful time for healthcare systems. Not only were emergency rooms overwhelmed by patients, a number of them were also hit by system-crippling cyberattacks. According to Comparitech, in 2020 alone, 92 ransomware attacks affected over 600 healthcare organizations, exposing more than 18 million patient records. These attacks brought operations to a standstill for days or weeks at a time, costing the healthcare industry an estimated $20.8 billion.