The Move to Modernize Ops Will Increase the Need for Software Supply Chain Security (F5)
The one thing we’ve learned from DevOps that you cannot ignore as you modernize ops is that SRE practices will incur much of the same technical debt and security challenges.
Cybersecurity 101: Basic Terminology You Need to Know (Arctic Wolf)
The constantly changing world of cybersecurity can leave you longing for an understanding of today's modern threats. A solid foundation of cybersecurity terminology is a great first step toward understanding the world of cyber threats and how to help minimize and mitigate risk for your organization.
Citrix Features Explained: Increase app security with Citrix Secure Private Access (Citrix)
As you explore how to secure SaaS applications, it’s vital you deliver anywhere access to your hybrid workforce without sacrificing SaaS app security.
This phishing attack delivers three forms of malware. And they all want to steal your data
Detailed by cybersecurity researchers at Fortinet, those who unintentionally run the malicious attachment sent in phishing emails fall victim to AveMariaRAT, BitRAT and PandoraHVNC trojan malware.
Zero Trust and SASE: Better Together for Financial Institutions (Palo Alto Networks)
Financial institutions must remain vigilant in light of evolving threats and sophisticated attackers, while addressing the need to support a remote workforce and leveraging the public cloud to drive technology innovation.
Modernize Data Protection Outcomes for MariaDB and MySQL (Pure Storage)
Open source databases like MySQL and MariaDB have grown in popularity, but a more modern approach to data protection is needed as ransomware attackers target backup systems.
5 Essential Ways to Improve SDLC Security (Check Point)
Vulnerabilities found in application platforms and third-party libraries have drawn growing attention to application security in the last few years, putting pressure on DevOps teams to detect and resolve vulnerabilities in their Software Development Life Cycle (SDLC).
6 Best Practices for Securing Employee Workstations Everywhere (CyberArk)
Workstations are now one of the easiest ways for attackers to compromise identities, launch ransomware attacks, exploit privileged credentials and start moving toward sensitive IT systems and exfiltrate confidential data.
ICYMI: Gotham’s CTO, Ken Phelan, was joined by Reciprocity Labs’ Chief Strategy Officer, Rob Ellis, to demystify SOC and ISO compliance in our latest CTO Tech Talk. See the link below for the full video.