Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Six SIEM Essentials for Successful SOCs

A few weeks ago, Gartner named Splunk Enterprise Security a Leader in the 2022 Gartner® Magic Quadrant™ for SIEM. This is the ninth consecutive year that Splunk has been placed in the Leader’s quadrant. We’re honored to be recognized and we believe our placement is a testament to our commitment to delivering a data-centric security analytics solution that accelerates threat detection and investigations.

Goals of Social Engineering

Social engineering, including phishing, is one of the best opportunities for an attacker to enter a well-secured network. Knowing what data is at risk is an important part of any security strategy. What data or systems of value does your organization have access to? That’s what an attacker will try to hijack. Sedara can help protect your organization against social engineering attacks and more. Subscribe to our YouTube Channel to learn more about protecting your organization.

Protegrity-Freedom To Innovate-Cross-border Data Privacy

Enterprise Data Protection & Privacy Platform for Cross-Border Compliance Why is protecting your data across borders important? For enterprise leaders, executives, and shareholders responsible for data moving across data flows, building a culture of privacy trust through comprehensive coverage establishes credibility, reliability, and growth.

The Freedom To Do More With Cloud Data

Despite the increase in cloud adoption, many organizations are still hesitant to move their confidential and highly sensitive data to the cloud. It’s not uncommon for companies to have concerns about being able to maintain the privacy, integrity, and security of their data when they migrate to the cloud or leverage cloud services. This is especially true for organizations that operate in highly regulated industries, such as healthcare, financial services, insurance, and the public sector.

How to Become FedRAMP Certified

We previously covered the basics of FedRAMP by simply asking “What is FedRAMP?” This time, we’re going to talk about how to become FedRamp Certified Cloud Service Provider (CSP). We’ll talk about some of the advantages of being FedRAMP authorized. We’ll also discuss FedRAMP compliance versus certification to understand the difference. Additionally, we will define terms you will need to know during your FedRAMP journey.

Tigera: Microsoft Azure: Hands-on AKS workshop Configuration Security and Compliance

In this AKS-focused workshop, you will work with Microsoft Azure and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment and is designed to help implement.

Tigera: Hands-on workshop: Implementing observability to secure containers and Kubernetes for EKS

Attend this in-depth, hands-on security workshop with Calico and AWS Dev Days experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

Tigera: Microsoft Azure: Hands-on workshop: Implementing container security on AKS

Attend this in-depth, hands-on, AKS-focused security workshop with Microsoft Azure and Calico experts to learn how to prevent, detect, and stop breaches in applications running on AKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

Tigera: AWS Dev Days: Hands-on EKS workshop: Implementing zero-trust security for containers

In this EKS-focused security workshop, you will work with Calico and AWS Dev Days experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on EKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment.

Tigera: Hands-on Openshift and Calico workshop: Implementing Zero-Trust Security for Containers and Kubernetes

In this Red Hat® OpenShift® focused workshop, you will work with a Tigera Calico Cloud and OpenShift expert to learn how to implement Zero-Trust security for workloads running on OpenShift. This 90-minute hands-on lab comes with your own Calico Cloud and OpenShift environment. Join us to learn how to.