As applications are no longer tied to infrastructure, you need security controls at the workload level that are shared dynamically with security in your network - for real-time, multi-layered protection. Micro-segmentation allows you to isolate critical resources to control access and is an important part of Zero...
The National Security Agency and the Cybersecurity and Infrastructure Security Agency have released new guidance on Kubernetes security, providing advice on securing container environments from supply chain threats, insider threats and data exfiltration risks.
Virtual visits transformed the healthcare industry, making care accessible to remote patients online. This change, while beneficial, also meant that millions of healthcare workers and patients began to exchange sensitive healthcare issues over unvetted cloud apps that weren’t built to secure health...
In this talk Sean explores what it means to be a modern technology leader and how we can drive the DevSecOps transformation. Sean will share his thoughts on modern leadership and DevSecOps and then sit down with Tom Field to diver deeper into these and other pressing topics for security leaders.
Key...
DevOps-driven adoption of new
technologies and processes
may mean security is an afterthought
and can expose new
gaps in security coverage and
risk management.
Download this whitepaper which provides an overview of what DevSecOps is and how organizations can adopt its
practices in conjunction with technologies...
Application security is complex, difficult, and costly. In today’s fast-moving digital economy, where speed to market is critical, most development teams do not have the resources or time to sufficiently protect against the onslaught of attacks that can disrupt their applications. Even while many of the security...
Did you miss ESET's Lukas Stefanko presentation on Stalkerware at RSA this year?
It looked at our analysis of dozens of Android stalkerware families, which are often flagged as undesirable or harmful by most mobile security solutions. Many of these apps also exhibit serious security and privacy issues that could...
The cybersecurity adversaries embrace the concept of "shift left," so shouldn't the defenders? Shivajee Samdarshi of Venafi discusses the implications and mindset change for software development and engineering teams.
n this talk Sean explores what it means to be a modern technology leader and how we can drive the DevSecOps transformation. Sean will share his thoughts on modern leadership and DevSecOps and then sit down with Tom Field to diver deeper into these and other pressing topics for security leaders.
Key...
Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of LogDNA, a log management company, and he’s committed to the popular “shift left” movement. But he’s also got a keen eye on the broader cybersecurity marketplace and shares insights on its seismic changes.
We’ve gone from a remote workforce to “work from anywhere.” How does this create new security challenges regarding the broad and unrestricted accessing of cloud apps? Sasi Murthy of Netskope discusses the path to zero trust data protection.
With more and more companies moving to DevOps, that statistic is likely to grow due to the increased demand for more applications faster meaning more chance for error. The good news is that these application vulnerabilities are extremely preventable through on-demand focused interactive lessons to learn how to code...
When software is everywhere, everything becomes an attack surface.
The root cause of many successful cyberattacks lies primarily in vulnerable software itself. The real question that needs to be asked is, “Can the industry do a better job of writing more-secure code, making software applications nearly...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.