Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Reasons to Stick with Open Source Velero for your Kubernetes Backup and Recovery

I recently had a chance to speak with Chris Mellor at Block and Files about the emergence of Velero as the standard for Kubernetes data protection. I shared some ballpark estimates of market share across open source and commercial vendors to make my case. These numbers were obtained through diligent market research. They are estimates, but they are not imaginary.

Millions of Patients Lose Control of Their Personal and Health Data in Harvard Pilgrim Breach

Harvard Pilgrim Health Care is an insurance provider that offers non-profit healthcare to residents in a variety of different states, including New Hampshire, Maine, Connecticut, and Massachusetts. The company generates more than $622 million in revenue annually and employs over 4,400 people during its regular operations. It works with millions of patients, and a mix of those patients was exposed in the recent data breach impacting that company.

Getting Started with SOAR in Mission Control

This video will take a new or existing user of Splunk Mission Control through the process of implementing SOAR playbooks within Mission Control. Splunk Product Manager Kavita Varadarajan will walk you through the necessary steps and configuration to deploy a SOAR playbook at a basic level. Learn how to fully leverage the full power of orchestration and automation to unify your security operations with Splunk Mission Control.

RKVST mitigating insider threats demo

Mitigate insider threats with RKVST. This demo is an example of how with RKVST it's quick and simple to identify who did what when to any asset so you can quickly see if there has been any malicious activity, when it happened and who was responsible. RKVST provenance-as-a-service enables organizations to authenticate data and build trustworthy digital supply chains. It also makes it quick and easy to locate an asset.

Resource Catalog

Resource Catalog provides visibility and security context directly to DevOps in the same platform they are already using every day to monitor their infrastructure. As a result, DevOps teams no longer have to react to a laundry list of security threats. Instead, they are armed with the insight to vigilantly detect security misconfigurations and reduce the mean time to remediation so that their security posture is strengthened.

How to Stay Safe While Online Gaming

To stay safe while playing online video games, you should follow cyber hygiene best practices to protect your anonymity. Best practices include using strong passwords, using a VPN and keeping your software updated. Read our eleven recommendations for keeping sensitive information secure and protecting yourself while playing online games.

UpGuard Summit May 2023 - Panel Discussion

Join Zindzi Speede, our Technical Customer Success Manager, as she and a panel of cyber security experts delve into topics such as best practices, compliance, and the implications of AI on cyber security. Guests Jacques Van Zyl - Cyber Security Analyst at Youi Insurance Alen Zenicanin - Information Security Officer at Law in Order Michael Viney - Head of IT at Square Peg Capital.

Forbes Media Publishes Industry's First List of America's Most Cybersecure Companies

In a climate where companies largely gain attention only when something negative happens, it’s time to celebrate and recognize the companies who are best in class when it comes to cybersecurity. That’s why we applaud Forbes’ decision to produce the industry’s first list of America’s Most Cybersecure Companies. These companies illuminate how cybersecurity is being taken seriously as a core business issue.