Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Why CloudCasa is the Best Choice for Backup and Recovery of Red Hat OpenShift

Red Hat® OpenShift® Container Platform (OCP) is an enterprise-grade Kubernetes platform for building, deploying, running, and managing containerized applications in a hybrid world. The reality is that with Red Hat OCP, building, deploying, running, and managing containerized workloads couldn’t be any easier.

Detect & Mitigate Your Ransomware Risk with Egnyte

In this video, Egnyte’s Chief Governance Officer Jeff Sizemore & Senior Manager of Governance Marketing Neil Jones discuss recent trends in ransomware detection and how you can mitigate potential attacks. A brief demo is provided at the end, where you will learn how to recover from a ransomware attack. Ransomware attacks continue to proliferate. We want users to understand the current state of ransomware attacks and to be able to prepare for attacks and manage them more effectively.

Introduction to Custom Fields

Use custom dimensions and measures to aggregate column values or filter data. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.

Where is Your Zone-to-Zone Connectivity Matrix?

If you’re like most of the complex IT shops we talk with, you probably don’t even have a current security matrix to store anywhere – file cabinet or data folder. The connectivity matrix is essentially the company security posture, but almost no one has a comprehensive way to visualize and easily understand the connectivity status between the various configured security policies (zone-to-zone policies).

ISO 27001 Compliance: What You Need to Know for Your Certification

Looking to become certified to the ISO 27001 standard? In this article you will learn what ISO 27001 is, the key terms and definitions, information security risks you need to consider, and the process for meeting your compliance and certification requirements.

Detecting CVE-2021-42292

On its surface, CVE-2021-42292 doesn’t look like the kind of vulnerability that a network-based tool can find reliably. Marked by Microsoft as a local file format vulnerability, security veterans would expect that between encryption and encoding, there would be a million different ways to evade network detection with a weaponized exploit.