Tag - security

CSPM vs. ASPM: Security for Cloud and Application

Written by Josh Dreyfus, Director of Product Marketing, ArmorCode. The software security space moves fast, and new acronyms pop up like weeds. Many of them sound similar, even if they do very different things. Take CSPM (Cloud Security Posture Management) and ASPM (Application Security Posture Management) for example. These two acronyms sound like they would be the...

Resource Constraints in Kubernetes and Security

A Practical Guide Originally published by Sysdig. Written by Nigel Douglas. The Sysdig 2024 Cloud‑Native Security and Usage Report highlights the evolving threat landscape, but more importantly, as the adoption of cloud-native technologies such as container and Kubernetes continue to increase, not all organizations are following best practices. This is ultimately...

Mobile market travels hundreds of miles weekly to ensure food security on Pine Ridge

Pine Ridge Indian Reservation is vast – over 3,000,000 square miles.  The distances families and elders must travel to access healthy food are long and prohibitive for many. Hundreds of families visit the Oyate Ta Kola Ku Community Center each month to access fresh food grown in our Medicine Root community gardens.  They also come to receive food boxes, each filled...

FS-ISAC Launches Program to Bolster the Financial Sector’s Supply Chain Security

Reston, VA & Cambridge, MA (19 January, 2022) – FS-ISAC, the only global cyber intelligence sharing community solely focused on financial services, announced today the launch of its Critical Providers Program designed to strengthen the security of the financial sector’s supply chain. As critical service providers increasingly host, connect, and protect a...

Cybersecurity Language: Enhancing Security and Compliance

Originally published by RegScale. Written by Dave Schmoeller. Kickoff: Navigating the Cybersecurity Language Landscape Imagine the chaos when a cybersecurity breach puts data at risk, and departments are left in a scramble. Cybersecurity tags the event a ‘security incident,’ Risk counters with a ‘data breach,’ while Compliance cries out ‘SLA violation’. The jargon...

Mastering Zero Trust Security in IT Operations

Originally published by Automox. Written by Landon Miles. If you’re unaware that cyber threats are becoming more sophisticated and frequent, you probably don’t work in IT. Unfortunately, the traditional “trust but verify” approach to cybersecurity just isn’t adequate anymore. A Zero Trust security framework operates on the principle that threats can...

Harnessing Threat Intelligence for Proactive Security

Originally published by CXO REvolutionaries. Written by Ben Corll, CISO in Residence, Zscaler. Let’s face it, our jobs as CISOs are a constant dance with the shadows. We fight invisible enemies, anticipate the next attack, and strive to stay one step ahead of ever-evolving threats. That’s where threat intelligence comes in – it’s the intel that...

CCSK v5: The New Standard in Cloud Security Expertise

Written by Martin Hall. Already trusted by thousands of companies and tens of thousands of cloud security professionals worldwide, the Certificate of Cloud Security Knowledge (CCSK) is the industry standard for cloud security expertise. And it’s about to get even better. Based on input from our member community and the world’s leading cloud security...