Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Nightfall: Learn How Bluecore Maintains Data Security on Slack with Nightfall

SaaS applications like Slack are challenging environments for enforcing data security policies. This is especially true for innovative, high-growth companies that have embraced a cloud-first philosophy. Learn first hand from Brent Lassi, CISO of the disruptive martech Bluecore, how the Nightfall platform enables his team to maintain data compliance best practices in environments like Slack, without hampering productivity.

Outpost 24: Webinar: Mastering container security in modern day DevOps

With increasing numbers of container breaches being reported in the news and hackers looking to spot new exploits in Docker and Kubernetes - how do you secure the application, the containers, and the host itself? In the modern world of DevOps where speed and efficiency are king as deadlines tighten and customer demands grow, it's important to ensure vulnerabilities hidden in containers are addressed and associated risks are mitigated early in the SDLC to prevent security issues (and time and cost fixing them) down the line.

Outpost 24: Live Secure Coding Tournament

Any developer can code but can you secure your code and deliver safe applications like a pro? Compete against other developers in a series of vulnerability code challenges that ask you to identify a problem, locate insecure code, and fix a vulnerability. In partnership with Secure Code Warrior, all challenges are based on the OWASP Top 10, and players can choose to compete in a range of popular software languages - C++, Java, Ruby, Python, PHP and more.

Outpost 24: Webinar: Bridging your Cyber Hygiene gap to prevent enterprise hacking

Whilst organizations are distracted by Covid-19 the work of cybersecurity must continue, with greater rigor, to mitigate rising cyber attacks. The threat of malware and ransomware are real but they often target known vulnerabilities with available patches that could have been prevented. Security leaders must re-focus their security best practice to level up cyber hygiene and ward off hacking attempts before they take shape.

Outpost 24: Webinar: Demystifying Web Application Security with Attack Surface Visibility

Many web applications contain a plethora of layers, and if not designed with security in mind, they can become a source for vulnerabilities and open pathways for attacks. Yielding a better understanding of your assets, their attack vectors, and the overall risk to your organization is vital to preventing web app attacks.

Outpost 24: Webinar: How to secure cloud services in the DevOps fast lane

The acceleration of digital transformation and cloud adoption during the pandemic meant more businesses have moved their development to the cloud. This trend is empowering DevOps to fast-track new technology adoption however at the detriment of security teams, who are struggling to keep up with new security requirements brought on by different cloud services and containerized apps.

Outpost 24: Webinar: Differentiating vulnerabilities from risks to reduce time to remediation

Struggling to identify which vulnerabilities pose a real threat to your business and what to prioritize? You're not alone. With thousands of vulnerabilities each day and time to remediation being the #1 challenge, its essential to understand the difference between security risk vs vulnerability to improve remediation decisioning and reduce exposure time.

Outpost 24: Webinar CISO Conversation: Media and entertainment security in the on-demand era

What will we cover When we talk about cyber-attacks we often think about financial gains and personal data. But in the fast-moving world of media and entertainment, any business disruption can put a dent in customer experience and cause substantial loss in advertising revenues. In this webinar we talk to Outpost24 customer Jaspal Jandu, Deputy Group CISO at ITV Plc and discuss how the iconic British TV channel tackles the growing cybersecurity threats to secure the high availability media operations (think Oprah with Megan and Harry and ITV Hub!) and delight millions of viewers.

Outpost 24: Webinar: API Security 101 and how to secure your web applications

APIs provide a great way for applications to connect services and transfer data. But the downside is that with every API created and consumed - there's an endpoint that could leave your applications and networks exposed to malicious attacks. With Gartner predicting API abuses to become the most-frequent attack vector by 2022, and API calls now representing 83% of all web traffic - API security is the new web application security.