Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Software supply chain risks to keep an eye on in 2022

As a supply chain security vendor, the growth is far from surprising for us at Bytesafe - with the supply chain being a noticeable security blind spot for many organizations. A massive 62% of organizations claim to have been impacted by supply chain attacks in 2021 alone. Incidents like log4j, ua-parser-js and colors.js/faker.js have once again shown that it’s vital to use services like the Bytesafe Dependency Firewall.

Fabrix

Fabrix AI is a an application analytics & intelligence company that provides cross-layer and cross-domain application operations insights irrespective of underlying technology stacks.

Tigera: Hands-on RKE workshop: Implementing Zero-Trust Security for Containerized Workloads

In this RKE focused workshop, you will work with a Calico and Suse Rancher expert to learn how to implement Zero-Trust security for workloads running on RKE. This 90-minute hands-on lab comes with your own Calico Cloud environment. Join us to learn how to: We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Tigera: AWS : Hands-on EKS workshop: Implementing Zero-Trust Security for Containers

In this EKS-focused workshop, you will work with a Calico and AWS expert to learn how to implement Zero-Trust security for workloads running on EKS. This 90-minute hands-on lab comes with your own Calico Cloud environment. Join us to learn how to: We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Tigera: 3 Ways to Achieve Zero-Trust Workload Security with Calico

A Zero-Trust approach to application security is a must-have in today's environment. But traditional network-based access controls are inadequate for containerized workloads as they don't have a fixed network address. Instead, Zero-Trust Security controls must be implemented at the workload level. Join us in this webinar where we share 3 ways to implement Zero-Trust Security at the Workload level with Calico.

Tigera: Hands-on workshop: Implementing Security and Observability for Containers

Attend this in-depth, hands-on workshop with a Calico expert to design and implement container security, zero-trust workload security, and advanced troubleshooting for your containerized workloads. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and is designed to provide more complete knowledge on: We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Tigera: Microsoft and Tigera: Hands-on AKS workshop: Configuration Security and Compliance

In this AKS-focused workshop, you will work with Microsoft and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned AKS and Calico Cloud environment and is designed to help implement.

Unpacking Netskope: The Evolution of Secure Web Gateways (SWG)

Two years through a pandemic with a shift to remote working and an increasing use of apps and cloud services has changed the playing field for secure web gateways. In the latest of our Unpacking Series, we dive into the evolution of Secure Web Gateways, and why Netskope Next Gen SWG is a visionary solution with unrivaled visibility and granular control. Join Netskope Product Marketing Director, Tom Clare, to talk all things SWG - one of the foundational components of a SASE architecture.

Forward Networks: My worst work day ever -- a headline making Security Breach

Who doesn't love a good story about someone else's misery? Derick Winkworth (@cloudtoad) is going to share the miserable day (and subsequent weeks) he found out the Fortune150 financial company he worked for was the victim of a headline-making security breach. He'll be joined by systems engineer Scott Arky who has his share of security-related pain. Learn how these events could have been prevented.

Netwrix: System Hardening: Defending Against Common Malware Tools & Living-off-the-Land Techniques

Malicious actors are always eagerly looking for vulnerabilities in your IT systems that they can exploit to steal your valuable data, disrupt your business operations and more. A critical strategy for reducing these risks is to harden your IT systems by uncovering and eliminating misconfigurations and other security gaps. That might seem like a tall challenge, but the truth is, many attacks use similar tools, techniques and procedures (TTPs).