Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OSINT-backed Supply Chain Assessments

You’ve probably encountered them. Self-reported ‘supplier security assessments’ – documents where fact and fiction can easily overlap if the requisite information cannot be readily validated. In reality, supplier questionnaires do offer an (albeit limited) indication of an organisation’s level of cyber maturity and are a necessary process.

Enhancing Cybersecurity in the Entertainment and Gaming Industries

The Entertainment and Gaming industries are thriving economies that cater to the enjoyment needs of millions worldwide. However, these sectors are far from immune to the growing threat of cyberattacks. In fact, they’re increasingly becoming a prime target for malicious cyber threat actors due to its widespread visibility and the perception that gamers and media consumers may be less vigilant about cybersecurity.

Balancing Ethics and Freedom: The Challenge of Regulating Public Access to Advanced AI like Chat GPT

In an era of rapid technological advancement, the availability of AI systems like Chat GPT to the public raises complex questions about ethics and limitations. Join us as we dive into the challenging debate surrounding the responsible use of this cutting-edge technology. 🤖⚖️ In this thought-provoking video, we explore the need for some rules to prevent the harmful use of AI while respecting the values of free expression. We will examine the difficult task of defining the ethical boundaries of AI systems and the impact of these decisions on our online conversations.

Seamless Just in Time Access to IaaS & SaaS

Too many domain admins and 24/7 database writing rights aren’t healthy for security... or your well-being. Now close your eyes and imagine… White sands... A gentle breeze... no junior access to production... One admin per system… A least privilege nirvana, and yet somehow everyone has access when they need it. Welcome to Entitle. The only just-in-time access management platform designed to grant granular and temporary permissions within IaaS and SaaS while maintaining a seamless employee experience.

Beam OSS: Easily Make your Infra Private Using AWS SSM

Beam is an OSS project that simplifies secure access to private infrastructure within non-public VPC environments. It replaces the traditional bastion host approach with AWS Systems Manager (SSM) for access, ensuring better security and user-friendliness, especially in dynamic environments with changing resources and multi-tenancy requirements. Beam eliminates the complexities of configuring SSM access, making it an accessible solution for various applications and environments while maintaining security best practices. Today Beam is available for AWS (SSM) and will expand to Google's Identity-Aware Proxy (IAP).

Falcon Cloud Security Enforcing Compliance: Demo Drill Down

The increased use of public cloud infrastructure has resulted in an explosion of cloud misconfigurations and vulnerabilities, resulting in non-compliance within organizations cloud environments. See how CrowdStrike Falcon® Cloud Security provides complete visibility and assessment into your multi-cloud deployments so you can take appropriate actions to enforce compliance.

Can a Single Pane of Glass Ever be Discovered for Cybersecurity?

In the ever-evolving landscape of cybersecurity, the concept of a ”single pane of glass” has long been the Holy Grail for many organisations. The idea is simple: consolidate all your cybersecurity tools and data onto a single dashboard for improved visibility and control.

Cloudy with a chance of more customers

As customers adopt a digital lifestyle, the financial services required to support their online purchases are growing at an unprecedented pace. To match these challenges IT organizations are frequently turning to the cloud and replacing traditional services. Cloud services are already well-rooted in virtually every aspect of the financial services industry and all signs point to this continuing into the future.

Securing APIs: Practical Steps to Protecting Your Software

In the dynamic world of software development, Application Programming Interfaces (APIs) serve as essential conduits, facilitating seamless interaction between software components. This intermediary interface not only streamlines development but also empowers software teams to reuse code. However, the increasing prevalence of APIs in modern business comes with security challenges.