Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Understanding cyber security vulnerabilities

Every other day, a new cybersecurity breach compromising common or 0-day vulnerability is reported. The rapid shift of digital businesses and remote work opened a whole arena for cyber attacks and increased the demand for solid defences. But, to stay ahead of adversaries, it is critical that you know what cyber security vulnerabilities are after too.

The Evolution of Application Security in a Cloud-Native World: Q&A with Chris Wysopal

As technology explodes, so do the threats. Point solutions emerge as security players innovate in order to keep up. This creates the need for consolidation, as the fragmented solutions become too much to manage. We’re entering a consolidation phase now, the process of distilling, refining, and letting the cream rise to the top. We sat down with cybersecurity veteran and vigilante, Chris Wysopal, to get his perspective on emerging trends in cloud-native security.

The State of Security: SIEM in 2022

The world of enterprise cybersecurity is exceedingly dynamic. In a landscape that is ever-changing, security professionals need to combat a class of evolving threat actors by deploying increasingly sophisticated tools and techniques. Today with enterprises operating in an environment that is more challenging than ever, Security Information and Event Management (SIEM) platforms play an indispensable role.

CISOs Need to Speak the Language of Board Members

"I understand the pitfalls of cyber security, but my boss just won't support me with the budget I need.” Does this sound familiar to you as a CISO? I have 3 pieces of advice for you: Speak their language I like to say that CISOs are from Mars, while CEOs and board members are from Venus. It’s because they don't speak the same language. You might go to your board and say, “I installed Akamai Prolexic.1.4.4.3.1./24 subnet to mitigate an SYN flood attack.”

Coffee Talk with SURGe: Signal Numbers Exposed, FTC Data Privacy Rules, Conti Ransomware, E2EE

Grab a cup of coffee and join Ryan Kovar, Mick Baccio, and Audra Streetman for another episode of Coffee Talk with SURGe. This week they discussed Signal's response to the Twilio breach, the FTC's effort to create new data privacy rules, and a $10 million reward for information about a suspected Conti ransomware operator.

Tigera: AWS Dev Days: Hands-on EKS workshop - Configuration Security and Compliance

In this EKS-focused workshop, you will work with AWS and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment and is designed to help implement: Configuration security including Kubernetes Security Posture Management (KSPM)

Tigera: AWS Dev Days: Hands-on EKS workshop: Implementing Zero-Trust Security for Containers

In this EKS-focused workshop, you will work with a Calico and AWS expert to learn how to implement Zero-Trust security for workloads running on EKS. This 90-minute hands-on lab comes with your own Calico Cloud environment. Join us to learn how to: We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Outpost 24: How to improve application security with Pentesting as a Service

Web application testing can take a lot of effort and still not providing the results your business need. In the face of an ever growing digital attack surface and agile release cycles, traditional pen testing is not enough. You need a combination of automated scanning and manual testing, delivered in real time by experienced testers, to ensure continuous coverage and accuracy of vulnerability findings to prevent common exploits. Join our webinar where our security expert explains how to increase your security testing efficiency and reduce risk with pentesting as a service (PTaaS) in Gartner's latest Hype Circle for Security Operations

Veracode Unveils Velocity Partner Program

Veracode announces the launch of the Veracode Velocity Partner Program. The objective of the program is to enable partners to grow their security practice quickly and profitably around Veracode's cloud-native Continuous Software Security Platform, offering opportunities to accelerate deal closure, expand market share, and grow revenue.