Fairwinds Insights Basics Tutorial: Validating OPA Policies in the CLI

Fairwinds Insights Basics Tutorial: Validating OPA Policies in the CLI

| | policy
The Open Policy Agent (OPA) is an open source, general-purpose policy engine that provides a framework for validating structured data across your cloud-native stack. It encourages users to write policy-as-code to extend ...
Cowbell Coalition cyberinsurance claim cyberinsurance contractor

Cowbell Adds Free Cybersecurity Services for Insurance Policy Holders

Cowbell this week added a free 24/7 managed security service for organizations that take out a cyberinsurance policy to help reduce the cost of a cybersecurity breach. Manu Singh, vice president of ...
Security Boulevard
What Are Open Source Kubernetes Policy Engines? Why You Need One & How to Pick

What Are Open Source Kubernetes Policy Engines? Why You Need One & How to Pick

| | open source, policy
The idea behind Kubernetes policies is that you will be more successful if you put guardrails in place for your development teams to ensure that they are adhering to Kubernetes best practices. Creating ...
Kubernetes Policy Enforcement for Developers

Kubernetes Policy Enforcement for Developers

| | policy
Policy Exists for a Reason You know that feeling where it's near midnight and you're outside of town and you pull up to a red light in your car and stop and ...
Finally! Windows to Block Password Guessing — by Default

Finally! Windows to Block Password Guessing — by Default

Brute-force guessing of Windows credentials is a common entry point for hackers. After 27 years, Microsoft is finally fixing the dumb default that allows it ...
Security Boulevard

Cybersecurity Policy – time to think outside the box?

When we get into cybersecurity, one of the first things any organisation or company should do is write a cybersecurity policy, one that is owned by all. Easy words to put down ...

Smarter policy and advanced component search with Nexus Lifecycle updates

In March, we talked about improvements to the Nexus Lifecycle policy tools and waivers. This month we’ve taken another step forward with better policy and waiver controls. This update helps development teams ...

HID Global’s Three Pillars of Operational Security

In view of the more frequent and more sophisticated attacks on the software supply chain, securing the software development lifecycle has become more important than ever. But that’s easier said than done ...

How Tripwire State Analyzer Can Help You to Comply with NERC CIP

Are you an organization that operates a Bulk Power System (BPS) in the United States? If so, you understand the need to comply with the Critical Infrastructure Protection (CIP) standards. Developed by ...
CrowdStrike HPE edge IBM attack surface ukraine CISA Log4j CISA BlackBerry IoT connected device Bluetooth

New IoT Legislation Means Advance Planning is Key

As 2020 wound to a close, the year’s end marked a major milestone in strengthening the security of Internet of Things (IoT) devices and systems. In December, the IoT Cybersecurity Improvement Act ...
Security Boulevard