Engineering Blog

                            

Security

Understanding MLSecOps: How to Build Secure AI Systems

Understanding MLSecOps: How to Build Secure AI Systems

Deep Dive into MLSecOps! Machine learning (ML) and artificial intelligence (AI) are transforming industries, but with that power comes a critical responsibility: securing these powerful tools. This episode of The (Security) Balancing Act brings together Diana Kelley from Protect AI and a panel of experts to discuss the essential concept of MLSecOps: Machine Learning Security…

HITRUST and Microsoft’s Dynamic Duo Against Cyber Threats

HITRUST and Microsoft’s Dynamic Duo Against Cyber Threats

HITRUST, a leader in information security and compliance assurance, has partnered with Microsoft to enhance its Cyber Threat Adaptive engine, introducing advanced AI capabilities to bolster the accuracy and timeliness of HITRUST CSF updates. This update enables HITRUST to analyze threat intelligence and breach data against CSF controls, ensuring relevance and effectiveness in managing cyber…

Cloud-Native SecurityCon: Collaboration with Innovation

Cloud-Native SecurityCon: Collaboration with Innovation

Unlock the future of security at CloudNativeSecurityCon! Join us for two days of collaboration, insights, and breakthroughs as we dive into cutting-edge cloud native security projects. From secure software development to supply chain security, explore the latest advancements and tackle tomorrow’s challenges head-on! What to expect : Ready to get your Mind Blow Away Register…

2023 Elastic Threat Report: Threats, Trends, and Tactics

2023 Elastic Threat Report: Threats, Trends, and Tactics

Features covered Read more Reference to the Article : Elastic Follow us more for such Updates !!

HITRUST 2024: Master Compliance & Cybersecurity

HITRUST 2024: Master Compliance & Cybersecurity

Elevate your understanding of compliance and cybersecurity! Attend the free webinar, “HITRUST 2024: Bridging Compliance and Cybersecurity,” on Wednesday, April 17th at 2:00 PM ET. Key benefits: This webinar equips you to: Register Now! Limited spots are available – register today! Reference to the Article- 360 Advanced Follow us for more updates!

Notary: Building a Secure Software Supply Chain Ecosystem

Notary: Building a Secure Software Supply Chain Ecosystem

Software supply chains are complex, making security a major concern. This video explores the Notary Project, a collaborative effort to secure the software supply chain ecosystem. The Notary Project tackles these challenges by: Join this session to learn how the Notary Project can empower your organization to build a more secure and trustworthy software supply…

Top 10 Reasons to Automate Kubernetes Security with Kyverno

Top 10 Reasons to Automate Kubernetes Security with Kyverno

Struggling to secure your growing Kubernetes environment? Kyverno can help! This video explores the top 10 features of Kyverno, a powerful tool for automating Kubernetes security with policy as code. From flexible policy creation to built-in reporting, Kyverno simplifies security management and streamlines compliance. Plus, the Kyverno family offers additional tools for enhanced JSON support,…

Securing 900 K8s: Mercedes-Benz’s Journey to VAPs

Securing 900 K8s: Mercedes-Benz’s Journey to VAPs

This talk explores how Mercedes-Benz secures their massive Kubernetes environment (over 900 clusters!). While Pod Security Policies (PSPs) were previously used, they’ve been deprecated. The new Pod Security Standards (PSS) lack the flexibility needed for Mercedes-Benz’s complex setup. Watch the video to learn: This talk is ideal for anyone managing large Kubernetes deployments and seeking…

Kubernetes Alert: Backdoor in XZ Utils! Secure Cluster Now!

Kubernetes Alert: Backdoor in XZ Utils! Secure Cluster Now!

This blog post explores the critical backdoor vulnerability (CVE-2024-3094) discovered in XZ Utils, a data compression library used in major Linux distributions. On March 29, 2024, Red Hat disclosed a critical vulnerability (CVSS rating of 10) affecting the latest versions of XZ tools and libraries (versions 5.6.0 and 5.6.1). This stemmed from a cleverly disguised malicious…