Kubernetes is rapidly becoming the leading container orchestration tool. Shreyans Mehta, CTO and co-founder of Cequence Security shares insights on what's different about Kubernetes and how organizations should be securing it.
North Korean hackers have been "targeting security researchers working on vulnerability research and development at different companies and organizations" to trick them into installing backdoored software that gives attackers remote access to their systems, warns Google's Threat Analysis Group.
For some, 'observability' is just a hollow rebranding of 'monitoring', for others it's monitoring on steroids. But what if we told you observability is the new way to find out why - not just if - your distributed system or application isn't working as expected? Today we see that traditional monitoring approaches can...
The ESG Technical Review of DivvyCloud Cloud and Container Security focuses on how DivvyCloud can enable a friction-free strategy for customers to embrace the cloud in their business operations.
ESG explored DivvyCloud's extensible, multi-cloud, software-defined security and governance platform, and how DivvyCloud...
Malware continues to increase in sophistication and
routinely evades organizations' cyber defenses.
Even though the industry has developed various
technologies to bolster detection and response, the
situation persists.
New strategies for combatting advanced malware
must move beyond existing detection approaches...
MITRE ATT&CK (Adversarial Tactics, Techniques & Common Knowledge) has served as a model through which interested parties can learn to identify and map digital intrusions against their existing security technologies allowing them to shore up their gaps and prevent more intrusions on endpoints.
But what about the...
When enterprises evaluate Cloud Security Posture Management (CSPM), automated remediation is frequently the end goal. But hastening initial implementation of remediation introduces a risk of organizational opposition to automation going forward.
Read this guide to learn:
The benefits of automated remediation;
How...
Leveraging CSP security controls is essential, and, for some cloud implementations, is sufficient to manage public cloud workload risk. For most enterprises, however, these controls alone are not adequate to address the core aspects of cloud security: audit, visibility, protection, detection, and automation.
Read...
In comparison to the traditional datacenter, more people are able to access, change, and deploy critical resources and services in the cloud. While this can be powerful, it also increases the likelihood of something going awry. We’ve seen cloud security issues in the headlines with alarming regularity. Read about...
Cloud misconfiguration-induced data breaches cost companies nearly $5 trillion in just two years. DivvyCloud conducted in-depth research on data breaches attributed to cloud misconfigurations, identified factors contributing to the likelihood of such data breaches, and quantified the overall impact on the affected...
In the increasing landscape of cloud technology, organizations must sort out the IT portion of the M&A process. The high profile nature of cloud, security, and the scope of data that is managed, and as a result, vulnerable to misuse, mismanagement, or exposure is a critical component to get right as part of your...
The world of ephemeral computing using the cloud, containers, and Kubernetes continues to evolve in ways that are both innovative and challenging. Change happens so fast it's hard for Security and GRC professionals to keep up. Organizations need to take a holistic approach to Kubernetes security and consider both the...
An organization that is transitioning to a large cloud provider should immediately consider the secure configuration of cloud services to be a critical element to governing these environments. Importantly, this cannot be a one-time event but must be implemented as a continuous approach.
Read this report to learn how...
As sophisticated malware continues to evade existing detection tools and
processes, security teams must adopt new technologies and use them to deploy
new detection, hunt, and response capabilities.
Security teams looking to improve
threat intelligence, hunting, analysis, and rapid response capabilities...
Containers are becoming more popular, but how do you deal with the security challenges of using containers?
You have to secure the application, the code, the web server and the host itself.
And how do you do this at the speed of DevSecOps?
Join Tim Chase, Director of Information Security at Healthstream, as he...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.