Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Defender Insights: Improving security visibility in the remote-work reality

This edition of Detectify Security Defenders Insights focuses on best practices on how not to lose security visibility in 2021: For many small to mid-sized tech organizations, security visibility is an increasing challenge. 2020 was the true catalyst to their tech transformation from all in-house to suddenly working from home. This meant a pressured effort to make sure security was top-of-mind especially now that everyone was literally out-of-sight.

OPA + Styra DAS free up time and resources for a CRM solution

Let’s say you were going to plan a security project. (Almost any project, really.) The following might be a pretty solid list of goals to aim for: That’s a pretty solid list - and might even read like “too much to ask for.” Yet, it’s exactly what SugarCRM received after deploying Styra DAS to manage Open Policy Agent (OPA) for Kubernetes guardrails.

Runtime security in Azure Kubernetes Service

Runtime security for Azure Kubernetes Service (AKS) environments requires putting controls in place to detect unexpected and malicious behavior across your applications, infrastructure, and cloud environment. Runtime threats include things like: Even if you’re taking advantage of tools like container image vulnerability scanning, Kubernetes pod security policies, and Kubernetes network policies with AKS, not every risk will be addressed.

Cyber Security in 2021: Confident Detection and Response

As the volume and sophistication of cyber threats grow, it’s imperative that companies have the ability to rapidly detect and confidently respond to a variety of threats. Devon Ackerman, Head of Incident Response for Kroll’s Cyber Risk practice in North America shares how security leaders feel their organizations are inadequately resourced to run a mature detection and response program.

Cyber Security in 2021: Beware Increased Assault on Endpoints

The COVID-19 pandemic rushed security teams to find ways to support a largely remote workforce, changing the cyber threat landscape with increased opportunities for criminals to exploit vulnerabilities in the work from home environment. Jason Smolanoff, Global Cyber Risk Practice Leader at Kroll, outlines his one big thing for 2021 when it comes to cyber security: the increased assault on endpoints, which will force information security professionals to gain full visibility into a variety of devices and systems now operating outside of the company network.

Forward Fix: Streamlining and Scaling Automation Workflows

Technical Solutions Architect Glen Turner showcases how Forward can help solve enterprise automation problems. Enterprise IT organizations are promised speed, effectiveness, and efficiency through network automation, but rarely receive it. Foward Enterprise can help. Foward gives you effective network automation through collecting/parsing network state information, normalizing it into a vendor-agnostic data model, and exposing the model for workflow.

75% of Apps in the Healthcare Industry Have a Security Vulnerability

In light of the current pandemic, our healthcare industry has been challenged like never before. Healthcare workers heroically stepped up to the plate, caring for those in need, while the industry itself digitally transformed to keep up with the influx of patient data and virtual wellness appointments.

Using Strategic Choices to Ensure Continuous and Effective Cyber Security

Organizations are overwhelmed by the choice of cyber security tools in the market. They need to balance prioritizing and remediating vulnerabilities with managing their secure configurations. What’s more, many organizations are using hybrid clouds where they need to protect assets that are hosted both on premises and in the cloud. This complexity requires a thoughtful approach to cyber security.