application service mapping Journey geolocation Ask Chloé Infosec Roger Clark of Silk Road

Why Service Mapping is Critical for Microservices Security

Service mapping serves as an essential tool for ensuring robust microservices-based application security.  ...
Security Boulevard
Eureka data security incident management

Blameless Locks Down Security Incident Management Over Slack

Blameless is making it simpler for security operations teams to manage multiple conversations and security incidents across Slack ...
Security Boulevard
Securing Your Cloud Environment: Understanding and Addressing the Challenges in Cloud Security

Securing Your Cloud Environment: Understanding and Addressing the Challenges in Cloud Security

As enterprises rapidly migrate critical infrastructure and data to the cloud, they lose visibility and control.  A recent report shows 80% of organizations encountered a significant security incident related to their cloud ...
Konstellation: A Tool for RBACpacking in Kubernetes

Konstellation: A Tool for RBACpacking in Kubernetes

The author presented this paper and corresponding tool at Black Hat: Arsenal 2023 on August 10, 2023. For a more general overview of Konstellation and its capabilities vis a vis Kubernetes RBAC, ...
New Study Backs An Identity-First and Inside-Out Approach to Cloud Security

New Study Backs An Identity-First and Inside-Out Approach to Cloud Security

Reading Time: 4 minutes TechTarget’s Enterprise Strategy Group released a new report detailing why proper management of identity and access is critical to reducing cloud security risk.  The report includes recent market ...
Google Cybersecurity Action Team Threat Horizons Report #7 Is Out!

Google Cybersecurity Action Team Threat Horizons Report #7 Is Out!

This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our seventh Threat Horizons Report (full version) that we just released (the official blog for ...
Google cloud security

Google Report Reveals Most Widely Used Cloud Attack Vectors

A Google report showed the majority of cloud security issues involved stolen credentials followed by misconfigurations ...
Security Boulevard
Executives Discussing Cloud-Native Application Development Strategy

Securely Transitioning to a Cloud-native Application Development Environment

Preparing to transition to cloud-native application development? Learn what steps you need to take do it securely. The post Securely Transitioning to a Cloud-native Application Development Environment appeared first on Signal Hill ...
As Breach Costs Soar, Organizations Need Data Protection Across the Multi-Cloud

As Breach Costs Soar, Organizations Need Data Protection Across the Multi-Cloud

In a world where vendor marketing is all-pervasive, trustworthy industry data can be a godsend for the time-poor IT buyer. Now in its 18th year, the IBM Cost of a Data Breach ...
[FREE] K-12 CYBERSECURITY INCIDENT RESPONSE PLAN TEMPLATE >> Get Your Copy Today!

How to use a cyber incident response plan template

Incident management isn’t easy. In fact, for most K-12 school districts, it’s an ongoing challenge. Fortunately, you’re in luck: We’ve created a free-to-use cyber incident response plan template — made specifically for ...