Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

TFiR Let's Talk! Recovery of Velero Backups to AKS & EKS

Sebastian Glab, Cloud Architect at CloudCasa, shows you how CloudCasa for Velero allows Velero users to manage their cluster using our software as a service platform. By plugging directly into Velero, CloudCasa provides user friendly, intuitive UI for Kubernetes cluster management utilizing Velero as the backup tool. Users can centrally manage their current backups and configuration across multiple clusters and cloud providers (AKS, EKS and GKE) in one place. They don't have to jump across different environments, access different clusters to see what's going on, they can simply go to Cloud Casa, and manage everything from there.

What is SaaS? Hint: It Doesn't Mean "Cloud"

The U.S. federal government is committed to implementing zero-trust cybersecurity across all government agencies. In 2021, the White House issued Executive Order (EO) 14028, directing federal agencies to adopt zero-trust network architectures. A few months later, CISA followed up with a draft Zero Trust Maturity Model.

Curating Open source Libraries on JFrog Platform, part II.

Software supply chain security has been the most widely discussed topic for anyone who is writing applications utilizing the majority of open-source or third-party libraries. This webinar will showcase JFrog Platform's abilities to curate and compose workflows to help isolate libraries that have vulnerabilities and promote libraries to repositories that can be safely used. This webinar will also demonstrate self-service curation workflows.

AI, Cybersecurity, and Emerging Regulations

The SecurityScorecard team has just returned from an exciting week in San Francisco at RSA Conference 2023. This year’s theme, “Stronger Together,” was meant to encourage collaboration and remind attendees that when it comes to cybersecurity, no one goes it alone. Building on each other’s diverse knowledge and skills is what creates breakthroughs.

Crypto is Being Stolen Via Compromised AT&T Email Accounts

Communications company AT&T offers email services to many of its customers. Those emails have recently been compromised by way of an interesting exploit that is costing customers millions of dollars in stolen cryptocurrency. AT&T customers are having their email accounts attacked, and those exploited email accounts are being used to steal additional data and to access cryptocurrency exchange accounts, which is a very serious issue for the impacted users.

Mastering Cyber Security - Overcoming Professional Challenges

Part 1 – Overcoming professional challenges Despite the high demand for information security professionals, the path to a successful career in this field is not without its challenges. Those who choose to pursue a career in information security must be prepared to face a range of difficulties and obstacles, from the pressure to stay up-to-date with the latest technology and trends, to the constant threat of cyber attacks.

Splunk SOAR Playbook of the Month: Tackling Phishing Attempts with Identifier Reputation Analysis

Security professionals have become all too familiar with the threat posed by phishing. Whether it’s a convincing looking email asking an employee to click a link to update their login credentials or a surprise text from the CEO asking them to send over gift card codes for a customer, phishing attacks have only continued to grow over the years. For 2023 alone, 33 million data records are expected to be compromised due to phishing attacks.

Cybertalk with Bill and Robin - 3rd April 2023 - The RSA Roundup

Join Bill Carter and Robin Johns as we learn what's happening in the world of CyberSecurity. Last week Bill was at the RSA Conference, where there were over 50,000 attendees and multiple security vendors present. But what topics were on the hears and minds of those who visited? Learn about the 'top 5' items which are currently concerning, and exciting, security practitioners in this latest episode.