Engineering Blog

                            

Security

Enable modern privileged access management with HashiCorp Boundary

Enable modern privileged access management with HashiCorp Boundary

September 18 12:00 PM EDT | September 19 9:00 AM BST | September 25 10:00 AM SGT Speakers : Dan Rohan Product Manager, Boundary Van Phan Technical Product Marketing Manager, Boundary and Consul Revolutionizing Secure Access with HashiCorp Boundary: Adopting a Modern, Identity-Driven Approach Traditional workflows for accessing infrastructure resources and applications often rely heavily…

Overcoming Common Container Security Challenges: Simplify and Secure

Overcoming Common Container Security Challenges: Simplify and Secure

Introduction to Container Security Container security encompasses practices, tools, and measures to protect the entire lifecycle of containerized applications. Containers offer portability and consistency across environments, crucial for modern software development. However, their unique structure presents distinct security challenges that need to be addressed. Why Container Security is Crucial Security breaches can occur at any…

Strengthening Your CI/CD Pipeline: Tackling Security Challenges Head-On

Strengthening Your CI/CD Pipeline: Tackling Security Challenges Head-On

CI/CD Security: A Refresher Continuous Integration and Continuous Delivery (CI/CD) have become the backbone of modern software development, enabling rapid, reliable, and consistent delivery of software products. However, with the increasing reliance on CI/CD pipelines, securing them has become non-negotiable. A compromised pipeline can lead to the deployment of vulnerable applications, causing significant damage to…

KBOM: The Key to Enhanced Kubernetes Security and Efficiency

KBOM: The Key to Enhanced Kubernetes Security and Efficiency

Understanding the Industry Standard for Container Orchestration Insights The Kubernetes Bill of Materials (KBOM) standard is designed to offer comprehensive insights into container orchestration tools widely used across various industries. This new standard aligns with other established Bill of Materials (BOM) standards, ensuring consistency and reliability. What is KBOM? KBOM is a project aimed at…

MKAT: Secure Your Managed Kubernetes Environment with Automated Auditing

MKAT: Secure Your Managed Kubernetes Environment with Automated Auditing

In today’s cloud-native world, securing your Kubernetes environment is paramount. Managed Kubernetes services like Amazon EKS offer convenience, but maintaining robust security requires vigilance. Enter MKAT, the Managed Kubernetes Auditing Toolkit, your one-stop shop for identifying common security vulnerabilities within your EKS cluster. Here’s what MKAT can do for you: Beyond the Features: How Does…

Revolutionize Your Kubernetes Network Security

Revolutionize Your Kubernetes Network Security

Date : June 4Time : 10.00 am PST Managing egress traffic in Kubernetes can be challenging, especially when it comes to identifying and controlling the flow of traffic leaving the cluster. Most legacy applications and tools rely on stable network identities to authorize or restrict traffic. For these applications to coexist with Kubernetes-based applications, they…

Fast and Secure: Building Strong AppSec in Your Existing Development Workflow

Fast and Secure: Building Strong AppSec in Your Existing Development Workflow

Is your rush to market leaving your software vulnerable? In today’s fast-paced world, the pressure to get software out the door quickly can sometimes overshadow critical security considerations. This can lead to a software supply chain riddled with vulnerabilities, exposing your applications to internal and external threats. Join this insightful webinar on May 30, 3:15 – 5:15 ,…

Unlocking the Potential: How NIST CSF 2.0 Redefines Cybersecurity Governance

Unlocking the Potential: How NIST CSF 2.0 Redefines Cybersecurity Governance

Date : May 29Time : 8.30 pm (Virtual) The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a widely recognized set of guidelines and best practices for managing cybersecurity risks. Recently, NIST released version 2.0 of the CSF, marking the first major upgrade in a decade. This update introduces several new requirements,…

From Alerts to Attacks: Let AI Drive Your Security Strategy with Elastic Security

From Alerts to Attacks: Let AI Drive Your Security Strategy with Elastic Security

Traditional SIEMs have long relied on human intervention for effective threat detection and response. However, the emergence of AI-driven security analytics solutions is revolutionizing the landscape of Security Operations Centers (SOCs). Elastic Security, powered by the Elastic Search AI platform, is leading this transformation by replacing manual processes with automated, AI-driven capabilities. With features like…

Innovate with Intelligence: Choosing Google Workspace for AI-Driven Transformation

Innovate with Intelligence: Choosing Google Workspace for AI-Driven Transformation

Google Workspace stands out in the new era of AI-powered productivity and collaboration due to its integrated AI capabilities, collaborative tools, enhanced communication features, advanced security measures, and scalability. By leveraging AI technology and providing a comprehensive suite of productivity tools, Google Workspace empowers organizations to work smarter, collaborate effectively, and stay secure in today’s…