Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Identity Governance: What Is It And Why Should DevSecOps Care?

Did you know that the household data of 123 million Americans were recently stolen from Alteryx’s Amazon cloud servers in a single cyberattack? But the blame for this cannot fairly be laid at the feet of Jeff Bezos. No – the origin of this theft, and many other cybersecurity crimes began long before this data was uploaded to any cloud server. In another high-level cyberattack, financial data on 47,000 Americans was exposed on an S3 bucket from the US National Credit Federation in 2017.

Migrating Reports to Advanced Analytics

Learn how to import existing reports into Advanced Analytics. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.

Ep 3 Frank W, Rich W, Kevin P - Securing the Digital Supply Chain

Securing the supply chain Ep. 3 - An amazing cast of security thought leaders - Rich Watson, Frank Weigel and Kevin Paige - 3 stellar security leaders who have an immense amount of experience in all sorts of companies and security program. We touch on FDIC, FIL guidance, GDPR impact, SDKs Ruby, Gems and oh so more!

Styra: Securing Your Cloud-native Apps with Styra & Kong

Join Styra CTO and Co-Founder, Tim Hinrichs, and Kong CTO Marco Palladino to learn how to extend enterprise-grade lifecycle management across popular open-source projects OPA and Kong Mesh. In this webinar, Tim and Marco will walk you through turnkey solutions for deploying OPA and Kong Mesh that can help your organization secure modern cloud-native applications with dynamic, policy-enabled traffic control for microservices.