Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

How to Mitigate the Risk of Ransomware Attacks

Ransomware attacks are rapidly increasing in frequency and cost. According to security experts, ransomware was a $20 billion industry in 2021, with an attack happening every 11 seconds according to Cybersecurity Ventures. Organizations victimized by these attacks can lose access to their networks and data, incur steep financial losses, and suffer significant reputation damage. Watch our on-demand webinar of world-renowned cybersecurity expert Dr. Eric Cole and Keeper CEO Darren Guccione for a forward-looking conversation around.

Tigera: Achieving Compliance with PCI, SOC2, GDPR, and more for Containers & Kubernetes

The dynamic and distributed nature of containerized workloads creates challenges for organizations to achieve regulatory compliance. Security, DevOps, and SRE teams need a step-by-step process that is easy to implement to ensure continuous compliance with regulatory and custom frameworks. Also, they require evidence reports on a scheduled or on-demand basis. Calico helps you achieve compliance for your workloads running on hosts, VMs, and containers.

Tigera: AWS Dev Day: Hands-on EKS workshop: Implementing Zero-Trust Security for Containers

In this EKS-focused workshop, you will work with a Calico and AWS expert to learn how to implement Zero-Trust security for workloads running on EKS. This 90-minute hands-on lab comes with your own Calico Cloud environment. Join us to learn how to: We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Tigera: 4 Ways to Protect Containerized Workloads at runtime

Containerized workloads must be protected at runtime from both container-based and network-based threats. With the increasing number of threats, security and DevOps teams require a solution that detects known and Zero-day threats and mitigates the risk from exposure. Calico provides comprehensive runtime protection for containerized workloads.

Tigera: How security policies can protect your environment from future vulnerabilities like Log4j

Solving a challenge like the Log4j vulnerability is important for a wide range of businesses and Kubernetes deployments; a fortress is only as secure as its weakest door! However, adopting a zero-trust deployment model and security policies is a great step towards mitigating the risk introduced by this kind of vulnerability. Join us to learn: You'll leave this session with some ideas for better cluster security and hopefully less worries next time a serious application vulnerability appears.
Sponsored Post

ITOps vs. SecOps vs. DevOps vs. DevSecOps

ITOps, SecOps, and DevOps may sound similar. Indeed, they are similar - to a degree. But they have different areas of focus, different histories, and different operational paradigms. Keep reading for an overview of what ITOps, SecOps, and DevOps mean and how they compare. We'll also explain where DevSecOps fits into the conversation - and why you shouldn't worry so much about defining these terms perfectly as you should about finding ways to operationalize collaboration between your various teams.

Detect suspicious login activity with impossible travel detection rules

Many modern applications are regularly accessed by countless users from all over the world, which makes it difficult to identify anomalous patterns in login activity indicative of a security breach. This challenge is compounded by the fact that people travel often and regularly access their accounts from new locations. To detect this common attack vector, the Datadog Cloud SIEM now provides the impossible travel detection rule type which helps you spot suspicious logins with confidence.

It's Easier Than You Think: Gaining Visibility Into SaaS Apps To Secure Your Data

Software-as-a-Service (SaaS) apps have become essential to how most of us run our organizations and stay productive — especially over the last two years. On any given day, you’re likely messaging colleagues using Slack or Teams, sharing files with partners from Google Drive or Microsoft SharePoint, or working in Workday or Salesforce to perform an HR- or sales-related business process.