Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

opsdemon

Latest posts

Access AWS RDS Databases in EKS Using Teleport Machine ID Without Passwords

At Teleport we love modern infrastructure and open-source software, but don't like static credentials and passwords. This created a challenge for us when deploying Temporal, an open-source workflow automation software on EKS: Temporal always requires a password to authenticate to the backend RDS database. To solve this problem, we turned to Teleport Machine & Workload Identity.

From Hidden to Exposed: Advanced Graylog Alerts for Malicious Activity

Think you've implemented every security measure possible? Think again. While you may have addressed many common attack vectors from both threat actors and Red Team engagements, there's always more to uncover. This session is designed to push your defenses to the next level by diving deep into the often-overlooked tactics that can significantly enhance your security posture.

Tines named launch partner for Wiz Defend

We’re excited to announce our status as a launch partner for Wiz Defend. The new solution from Wiz draws upon the power of Wiz Integration Network (WIN) partners to better detect and respond to cloud threats in real time. We were selected as a launch partner due to our leading workflow orchestration and automation capabilities, which seamlessly connect with Wiz Defend to empower customers and their SOC/Incident Response teams.

How Can You Identify Your Internet-Facing Applications?

In today's digital landscape, organizations are increasingly reliant on internet-facing applications to conduct business and engage with customers. However, many organizations are unaware of the full extent of their internet exposure. Can you secure your organization if you do not know which internet-facing applications you own? Not effectively.

Proactive Threat Management: Strategies for Modern Cybersecurity

Businesses are under more and more pressure to protect their digital assets in a world where cyber risks change every day. Threat management is now an important part of modern safety because it makes sure that companies can detect, mitigate, and react to threats right away. Advanced threat protection that works not only lowers risks, but also makes businesses more resilient, so activities stay safe and don't stop.

The Hidden Dangers of Legacy PAM: Why Your Security Solution May Actually Be a Risk

As a former federal CISO who has spent decades designing and securing enterprise infrastructure, I’ve grown increasingly concerned as organizations continue to rely on legacy Privileged Access Management (PAM) solutions designed for a different era. These systems, once the gold standard in security, have become dangerous liabilities in today’s modern cloud-native world.

Diversity Can Be a Powerful Tool in Combating Increasing Cybersecurity Threats

The issue of diversity in the cybersecurity sector has been present since the early days of IT companies. The public perception of a cybersecurity professional carries with it a specific image of the kind of person who works in IT and cybersecurity, and many minority groups—including women, people of color and ethnic minorities, and disabled and neurodivergent people—are heavily underrepresented in the workforce.

How to Conduct a Risk Assessment for Your Disaster Recovery Playbook

Risk management is at the heart of any effective disaster recovery (DR) plan or playbook. No business is immune to disruptions, whether from natural disasters, cyberattacks, or technical failures. The question isn’t if, but when these threats will materialize. A proactive approach to risk management allows businesses to identify, assess, and mitigate these threats before they can bring operations to a standstill.

Everything You Need to Know About Shadow IT

Shadow IT refers to the use of information technology systems, devices, software, applications, and services without explicit approval from an organisation's IT department. While it sounds sinister, and has certain implications, it is not always done maliciously or with the intent of breaching security. It encompasses a wide range of digital activities where employees leverage unapproved tools to be more productive or achieve specific goals.