Post Tagged with: "gf_row"

It Started Out With a Phish: Area 1 Security 2021 Email Threat Report

Download your copy of “It Started Out With a Phish: 2021 Report” now to learn:• The types of attacks most commonly delivered by phishing• Direct financial losses due to Business Email Compromise• Identity deception tactics and top impersonated brands used in supply chain, ransomware and other targeted attacks

Read more ›

How People.AI Reduced Cloud Configuration Issues by 97% | Case Study

People.ai relies heavily on Terraform and AWS for its cloud infrastructure. With over 10,000 resources in their infrastructure, gaining visibility and reducing security risks was proving to be difficult and time-consuming. As they constantly evolved their configured resources and scaled their cloud infrastructure footprint, they wanted to stay on top of best practices in keeping their environments secure. Download this […]

Read more ›

Putting the Sec in DevSecOps | Talk Recording

Planning, provisioning, and changing infrastructure are vital to rapid cloud application development. Incorporating infrastructure-as-code into software development promotes transparency and immutability and helps prevent bad configurations upstream. In this session, we’ll embed infrastructure-as-code security into a set of Auto DevOps gitlab pipelines, highlighting a workflow for catching issues in frameworks such as Terraform, CloudFormation and Kubernetes right from the developers […]

Read more ›

Cloud DevSecOps With Bridgecrew and Terraform | Hands-on Workshop Recording

Gain hands-on experience with the help of experts from Bridgecrew and Hashicorp! From scanning infrastructure as code (IaC) for security misconfigurations to implementing automated DevSecOps workflows, this workshop will provide a hands-on experience to automate your cloud security. In this hands-on workshop, we’ll walk through:• An overview of DevSecOps and Terraform infrastructure as code (IaC)• Getting started with Bridgecrew to […]

Read more ›

The DevSecGuide to Infrastructure as Code

In this guide, we’ll explore the challenges of leveraging DevSecOps to secure the cloud and how infrastructure as code (IaC) makes it all possible. With research on the state of IaC security, advice for embracing a DevSecOps culture, and practical tips for embedding IaC security guardrails throughout the DevOps lifecycle, this guide is perfect for anyone looking to take a […]

Read more ›

Real Examples of Third-Party Risk: Lawsuits, Millions of Dollars, and Reputational Damage

Securing your own organization against threat actors is hard enough. Add in all of the ways you can be exposed to danger through your third-party vendors and the idea of being fully secure seems nearly impossible. When Blackbaud experienced a ransomware attack, the number of organizations impacted totaled nearly 250, and the SolarWinds supply chain attack led to between 40 […]

Read more ›

How Brand Protection Safeguards Your Customers and Your Reputation

Your organization’s most important asset is its brand. The brand encompasses everything — the people, services, products, interactions — that comes to mind when thinking about your organization. Any damage done to your brand as a whole has an outsize effect and can cause the public to lose trust, and ultimately choose another option. Case in point: 80% of consumers […]

Read more ›

Patch What Matters with Risk-Based Vulnerability Management

Patching vulnerabilities is critical for protecting an organization’s data and assets. 60% of breaches have been linked to a vulnerability where a patch was available but not applied. However, identifying which vulnerabilities are a priority is difficult, and relying on CVSS scores alone won’t do the job. Of the 18,000 vulnerabilities identified in 2020, nearly 60% fell into the categories […]

Read more ›