Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Introducing INETCO BullzAI Cybersecurity for Enterprise

The Russian invasion of Ukraine has triggered an escalation in the number of state-sponsored actors targeting critical infrastructure with DDoS attacks. Criminal syndicates and smaller players are also exploiting the crisis. From fake fundraising efforts for Ukraine to account takeovers and high-velocity bot-driven attacks such as DDoS, BIN attacks, and terminal attacks, cybercriminals are stepping up their own attacks in an effort to benefit from the turmoil.

DirtyPipe (CVE-2022-0847) - the new DirtyCoW?

A few days ago, security researcher Max Kellermann published a vulnerability named DirtyPipe which was designated as CVE-2022-0847. This vulnerability affects the Linux kernel and if exploited, can allow a local attacker to gain root privileges. The vulnerability gained extensive media follow-up, since it affects all Linux-based systems with a 5.8 or later kernel, without any particular exploitation prerequisites.

Improving FedRAMP: Federal Procurement & Risk Management

The Federal Risk and Authorization Management Program (FedRAMP) has been in place for just over a decade (2011). Its purpose is to provide a “cost-effective, risk-based approach for the adoption and use of cloud services” by the federal government. This is to equip and enable federal agencies to utilize cloud technologies in a way that minimizes risk exposure through security and protection of federal information and processes.

CCPA Compliance Checklist

California Consumer Privacy Act is a data privacy regulation established in the US. Achieving and maintaining compliance with the regulation can be overwhelming for organizations. But with the right understanding of the CCPA Compliance regulation and adhering to the compliance requirements, achieving compliance can be easy. So, explaining the regulation in detail we have shared an informative checklist that organizations can refer to as steps to achieve CCPA compliance.

CMMC Town Hall With Michael McLaughlin, UMD ARLIS | 3/9/22 | NeoSystems

NeoSystems CMMC Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly CMMC Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, how to prepare for CMMC certification, and the latest updates from the CMMC AB.

1Password: The Heart of Cybersecurity Webinar Series: Women in Tech Panel

At 1Password, our goal is to keep everyone, everywhere safe as they go about their work and play. In our webinar series, "The Heart of Cybersecurity," we explore what's really at the heart of the complex world of cybersecurity: real people, solving real problems, and their extraordinary stories. Since March is Women's History Month, we're switching it up and featuring not just one, but four incredible women. Our guests will share their experiences in the tech and cybersecurity space as Katya Laviolette, Chief People Officer at 1Password, moderates.

Tigera: Hands-on RKE workshop: Configuration Security and Compliance for Containers and Kubernetes Environment

In this RKE-focused workshop, you will work with Suse Rancher and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned RKE and Calico Cloud environment and is designed to help implement.

Tigera: Rancher Masterclass: Configuration Security and Compliance for Containers and Kubernetes Environment

In this RKE-focused workshop, you will work with Suse Rancher and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned RKE and Calico Cloud environment and is designed to help implement.

Netskope: Get the Details: Security Service Edge (SSE)

Security Service Edge (SSE) is a set of security-focused services delivered through the new, SASE cloud-native security architecture for better end-user experiences when securing any user on any device to any service running in public or private clouds. According to Gartner®, "by 2025, 80% of enterprises will have adopted a strategy to unify web, cloud services and private application access from a single vendor's security service edge (SSE) platform."