Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar

Zero Trust - Replacing Depth with Logic. Identity & Access Management eSummit 2022

In a hybrid work setup, workers should be able to authenticate themselves in the virtual environment securely. However, identity theft and technologies like deep fakes ensure that securing identities remains a major challenge. Organizations want to ensure their identities are safe and hack-proof. Join industry leading practitioners and experts to learn how to protect identities.

`npm init JSQuiz` The JS trivia night where you can win prizes!

Hey there friends of JS! Now tell me... do you think you could be a master of JS? Maybe you’re also a local legend of trivia night? Even if you’re neither of those things… Come and have a blast with us LIVE, and win some awesome prizes!! Join us on May 11 for a live trivia game hosted by @snyksec and @BrisJS, Test your JavaScript and Node.js knowledge for a fun-filled evening. Swag, giveaways and bragging rights included!

Identity-Based Data Security on AWS

Speakers: Dave Cole, CEO of Open Raven Ev Kontsevoy, CEO of @Teleport Modern data drives business value. But the speed with which it is created and accessed across a global AWS footprint increases risk considerably. The old ways of securing data – VPNs, shared credentials stored in a secure vault, offsite backups – are no longer sufficient and don't work at cloud-scale. Join Teleport CEO Ev Kontsevoy and Open Raven CEO Dave Cole as they present a practical view of modern data security in two parts.

Stranger Danger: Your JavaScript Attack Surface Just Got Bigger

Building JavaScript applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome, you're a cloud native application developer! As developers, our responsibility broadened, and more software means more software security concerns for us to address.

Datadog on Detecting Threats using Network Traffic Flows

At Datadog’s scale, with over 18,000 customers sending trillions of data points per day, analyzing the volume of data coming in can be challenging. One of the largest log sources internally at Datadog are networking logs. Being able to analyze and make sense of them is critical to keep Datadog secure. To help with the task, we have built a flow analysis pipeline that alerts against network level Indicators of Compromise (IOCs) like IP address, port combinations, and data exchanged.