Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

SEC's Proposed Disclosure Amendments: Are You Impacted?

On March 9, 2022, the Securities and Exchange Commission (SEC) announced proposed rules and amendments to enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting. These proposed amendments impact all public companies subject to the reporting requirements of the Security Exchange Act of 1934. To summarize this proposal and learn how to successfully prepare for them, read on.

15 Ways to Protect Data with Digital Security Watermarks

Everyday business documents continue to be one of the biggest sources of data leakage. The Facebook leaks and WikiLeaks are prime examples of the damage such breaches can wreak. Even with the best security tools in place users seem to always be able to find a way to circumvent security. Or, as in most cases, accidentally share data with the wrong audience creating a security issue.

Export and Distribute SBOMs Directly From Your Git Repositories

Guest Blog by Daniel Parmenvik – CEO of bytesafe.dev For many, Software Bill of Materials (SBOMs) have changed from a manual list of assets for due diligence procedures to become an integral and automated part of software development. The ever increasing appetite for open-source software translates into a need to keep track of software assets (or open-source dependencies) for all applications, at any given point in time.

Protect Your iOS Keeper Vault with FIDO2 WebAuthn and Yubikey NFC

Keeper provides advanced vault protection using device verification, first-factor authentication through either Master Password or Single Sign-On, and second factor authentication through hardware based security keys like the YubiKey. Security keys provide the highest level of protection by requiring hardware authentication in addition to your password at login. The Keeper iOS app supports Yubikey FIDO2/WebAuthn security keys with a Lightning connector or NFC.

Tigera: Runtime Security for Cloud-Native Applications with eBPF

In the dynamic cloud-native environment, applications need constant observability and monitoring to identify and mitigate risks from malicious activities before they evolve into security breaches and compliance risks. Calico Cloud runtime security is the enforcement of security policies and threat detection across network, process, file, and system behavior of containerized workloads. Calico Cloud uses eBPF probes to baseline workload behavior and build a statistical model of file system activity, network activity, process profile, syscalls initiated or attempted by the workload. Any deviations from this baseline are evaluated against indicators of compromise to generate alerts.

Tigera: Microsoft and Tigera: Hands-on AKS workshop - Implementing Zero-Trust Security for Containers

In this AKS-focused workshop, you will work with a Calico and Microsoft expert to learn how to implement Zero-Trust security for workloads running on AKS. This 90-minute hands-on lab comes with your own Calico Cloud environment. Join us to learn how to: We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Tigera: Protecting modern cloud-native applications from network-based threats with runtime security

As security teams are taking a breather after patching and fixing their systems for the Log4shell vulnerability, the next threat is not too far. These cyber attacks will continue to happen and as long as organizations ramp up their security, precious time and effort will be lost in finding and fixing similar vulnerabilities. To help platform and DevOps teams invest in the right strategy and assist in protecting cloud-native workloads, Calico has purpose-built solutions for mitigating not only known threats but zero-day attacks too.

7 vital security tips for enterprise cloud security administrators

Every organization has tons of sensitive information stored in the cloud. The unanticipated surge in remote work resulted in an increase in the amount of information stored in the cloud. According to TechJury, 67% of enterprise infrastructure is cloud-based. However, with organizations allowing employees to use both business and personal devices at work, the attack surface has expanded, increasing opportunities for threat actors to target vulnerable devices.