Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar

Webinar | Best Practices for Auditing K8s | Gravitational | Ev Kontsevoy | Andrew Lytvynov

In this webinar, Ev and Andrew have a conversation about auditing kubernetes, what those logs might look like in a platform like Sumo Logic, and what added benefits one could receive from using a secure access tool like Teleport for audit logs and alerts.

Enterprise Security Controls for Kubernetes

In this talk, we will explore how to meet common enterprise security control needs when running Kubernetes. Specifically, we will look at a range of common enterprise security needs and how you can meet these with standard Kubernetes primitives and open source projects such as Calico, or take it a step further with the additional features of Calico Enterprise.

Downtime Should Never Be Unplanned

After the onset of Covid-19, organizations pivoted quickly from a fixed, traditional kind of infrastructure to a virtual, distributed one to support remote workers and enable social distancing. The nature of stop-gap responses to this crisis opens your organization up to more risk, less resiliency and redundancy. How are you going to make sure your flexible architecture and dispersed teams can deal with penetrations, loss of connectivity and other outages? Now, more than ever, comprehensive governance across all of your infrastructure—in both IT and OT networks—is essential.

Design and Implementation of OEM ICS Cybersecurity Frameworks

It can be difficult to develop and refine cybersecurity initiatives when you face numerous obstacles like legacy systems, architectural changes and much more. Explore how you can effectively establish your security objectives and what you need to meet them with Tripwire's Robert Landavazo and Mike Zavislak from Baker Hughes in this excerpt from the SANS Oil and Gas Solutions Forum.

Lifting The Veil Of The Dark Web

See How Companies Arm Themselves With The Right Tools To Protect Against Threats From The Dark Web. We've all seen what's possible with the Dark Web thanks to Silk Road. If you're interested in buying or selling someone's personal data, such as credit card or social security information, it’s disturbingly easy to do. All you need is a computer and the Tor Browser, and it's all completely anonymous.