Use offense to inform defense Find flaws before the bad guys do

January 16, 2019

The information technology community has utilized container technology since the LXC project began in 2008 (Hildred, 2015). Containers are a form of virtualization that package application code and its dependencies together. Containers share the operating system kernel but maintain isolated processes. Until recently, it was not possible for the Windows operating system to share its kernel.

Spotlight

CloudLock

CloudLock is the leading provider of cloud cybersecurity and CASB solutions, securing SaaS, PaaS, IaaS, and IDaaS environments and extends custom security services to homegrown applications, as well as ISV offerings. CloudLock enables enterprises such as Whirlpool, Seagate Technology, Costco, HBO, Ahold, BBVA and the Guardian to protect data in the cloud, reduce risk, achieve compliance, manage threats, and increase business productivity. CloudLock is the only security vendor combining U.S. and Israeli Military Intelligence with real-time, crowdsourced cloud security insight, continuously monitoring over one billion files daily across more than 10 million users. Security professionals feed into CloudLock’s security insight through peer-driven, crowdsourced Community Trust RatingsTM.

OTHER WHITEPAPERS
news image

identity and zero trust - H-ISAC

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More
news image

Veritas Alta SaaS Protection

whitePaper | January 25, 2023

Veritas Alta™ SaaS Protection (formerly known as Netbackup SaaS Protection) is a cloud-based secondary storage platform for enterprise organizations to centrally protect, analyze, search, and manage all types of SaaS application data at any scale.

Read More
news image

ZTE Cybersecurity White Paper 2021

whitePaper | October 29, 2021

Telecommunications equipment and systems, as critical infrastructure for a nation, have been widely valued by governments, operators, and users worldwide. Currently, the deployment of 5G has begun. Featuring faster speed, greater network capacity, and ultra-low latency, 5G will redefine the operation of critical infrastructure from the factory floor to the cloud. Its new technologies including Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), and network slicing are paving the way for smart cities, remote surgery, autonomous vehicles, and large-scale Internet of Things (IoT) connectivity.

Read More
news image

N-able N-central Security White Paper

whitePaper | June 22, 2023

As an integral component of your IT management system, N-able N-central® complements an organization’s existing security policies and infrastructures. N-able N-central consists of a number of components that were specifically designed to provide flexibility as well as to ensure the integrity of the security of the networks on which N-able Ncentral operates.

Read More

Spotlight

CloudLock

CloudLock is the leading provider of cloud cybersecurity and CASB solutions, securing SaaS, PaaS, IaaS, and IDaaS environments and extends custom security services to homegrown applications, as well as ISV offerings. CloudLock enables enterprises such as Whirlpool, Seagate Technology, Costco, HBO, Ahold, BBVA and the Guardian to protect data in the cloud, reduce risk, achieve compliance, manage threats, and increase business productivity. CloudLock is the only security vendor combining U.S. and Israeli Military Intelligence with real-time, crowdsourced cloud security insight, continuously monitoring over one billion files daily across more than 10 million users. Security professionals feed into CloudLock’s security insight through peer-driven, crowdsourced Community Trust RatingsTM.

Events