Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Tigera: Five things to consider in a security solution for containerized workloads

As organizations transition from monolithic services in traditional data centers to microservices architecture in a public cloud, security becomes a bottleneck and causes delays in achieving business goals. Traditional security paradigms based on perimeter-driven firewalls do not scale for containerized workload. In this webinar, you will learn about five essential things you need when you evaluate a security solution.

Tigera: Container security basics (part 3) - Mitigate security risks during build and runtime stages

Most container security tools provide scanning capabilities to find vulnerabilities but don't focus on the critical step of mitigating the risk of security threats that can exploit these vulnerabilities. In this final webinar on container security basics, we take a look at topics below to mitigate the risks of exploitation of vulnerabilities.

Tigera: Microsegmentation for Containers and Microservices: Best Practices

There is a reason why traditional network-based segmentation solutions will not work in cloud-native environments - they are not built for it! A Kubernetes-native approach is required to isolate containzerized workloads within a deployment. Since Kubernetes is an open system with underlying dynamic infrastructure and no built-in mechanisms to prevent the lateral movement of security threats, Microsegmentation is the only way to isolate and protect workloads from threats that can move laterally.

Netwrix: How To Implement A CIS Hardened Build Standard

Commercial and open source system configurations generally lack all the necessary security measures needed before deploying into production. These configurations will often times have features and functionalities enabled by default, making them less secure and a prime target for today's cyber criminals. Implementing a CIS hardened build standard can help you address this issue by disabling and removing unnecessary functionalities and features, allowing your security team to proactively minimize system vulnerabilities, enhance system integrity, achieve compliance, and reduce your attack surface.

Netwrix: File Integrity Monitoring: An Effective Way to Detect Cyberthreats in Real Time

Any unexpected change to a system file can indicate a network security breach, a malware infection or other malicious activity that puts your business at risk. File integrity monitoring (FIM) helps you promptly detect such changes by continuously monitoring system folders on their servers. Indeed, FIM is so critical for data security that most common compliance regulations and security frameworks, including PCI DSS, HIPAA, FISMA and NIST, recommend implementing it whenever possible.

Netwrix: How to Enhance the Security of Microsoft Teams

Microsoft Teams empowers users at organisations to work together seamlessly and productively. This powerful platform supports cross-functional and even cross-organisational collaboration - and that openness introduces concerns about unfettered file and data sharing. Join this webinar to enjoy the benefits of Teams while maintaining strong security. You will also see Netwrix Auditor for SharePoint and Microsoft Teams in action.

The Developer's Guide to a Seamless Kubernetes Deployment

To grasp the concept of a Kubernetes Deployment and Kubernetes Deployment strategy, let’s begin by explaining the two different meanings of the term “deployment” in a Kubernetes environment: Kubernetes Deployment allows you to make declarative updates for pods and ReplicaSets. You can define a desired state and the Deployment Controller will continuously deploy new pod instances to change the current state to the desired state at a controlled rate.

The dos and don'ts of startup security: How to develop a security plan

This is the third part of a three-blog series on startup security. Please have a look at part one and part two. New companies often struggle with the question of when to start investing in information security. A commonly heard security mantra is that security should be involved since the very beginning and at every step along the way. While this is obviously true, it is quite detached from reality and provides little practical guidance.

The Rise of Vishing and Smishing Attacks - The Monitor, Issue 21

Kroll has observed an increase in two social engineering tactics known as “vishing” and “smishing.” These tactics use phone calls, voice altering software, text messages and other tools to try to defraud unsuspecting people of valuable personal information such as passwords and bank account details for financial gain. These types of attacks use similar techniques to the common infection vector, phishing.

Introducing Netskope Borderless WAN

Security transformation doesn’t succeed without network transformation. The two go hand-in-hand when it comes to building the secure access service edge (SASE) architecture of the future, and if security degrades the network experience, or the network experience bypasses security, each of those trade-offs introduces more risk to the enterprise—it doesn’t have to be that way.