Engineering Blog

                            

Security

2023 Elastic Threat Report: Threats, Trends, and Tactics

2023 Elastic Threat Report: Threats, Trends, and Tactics

Features covered Read more Reference to the Article : Elastic Follow us more for such Updates !!

HITRUST 2024: Master Compliance & Cybersecurity

HITRUST 2024: Master Compliance & Cybersecurity

Elevate your understanding of compliance and cybersecurity! Attend the free webinar, “HITRUST 2024: Bridging Compliance and Cybersecurity,” on Wednesday, April 17th at 2:00 PM ET. Key benefits: This webinar equips you to: Register Now! Limited spots are available – register today! Reference to the Article- 360 Advanced Follow us for more updates!

Notary: Building a Secure Software Supply Chain Ecosystem

Notary: Building a Secure Software Supply Chain Ecosystem

Software supply chains are complex, making security a major concern. This video explores the Notary Project, a collaborative effort to secure the software supply chain ecosystem. The Notary Project tackles these challenges by: Join this session to learn how the Notary Project can empower your organization to build a more secure and trustworthy software supply…

Top 10 Reasons to Automate Kubernetes Security with Kyverno

Top 10 Reasons to Automate Kubernetes Security with Kyverno

Struggling to secure your growing Kubernetes environment? Kyverno can help! This video explores the top 10 features of Kyverno, a powerful tool for automating Kubernetes security with policy as code. From flexible policy creation to built-in reporting, Kyverno simplifies security management and streamlines compliance. Plus, the Kyverno family offers additional tools for enhanced JSON support,…

Securing 900 K8s: Mercedes-Benz’s Journey to VAPs

Securing 900 K8s: Mercedes-Benz’s Journey to VAPs

This talk explores how Mercedes-Benz secures their massive Kubernetes environment (over 900 clusters!). While Pod Security Policies (PSPs) were previously used, they’ve been deprecated. The new Pod Security Standards (PSS) lack the flexibility needed for Mercedes-Benz’s complex setup. Watch the video to learn: This talk is ideal for anyone managing large Kubernetes deployments and seeking…

Kubernetes Alert: Backdoor in XZ Utils! Secure Cluster Now!

Kubernetes Alert: Backdoor in XZ Utils! Secure Cluster Now!

This blog post explores the critical backdoor vulnerability (CVE-2024-3094) discovered in XZ Utils, a data compression library used in major Linux distributions. On March 29, 2024, Red Hat disclosed a critical vulnerability (CVSS rating of 10) affecting the latest versions of XZ tools and libraries (versions 5.6.0 and 5.6.1). This stemmed from a cleverly disguised malicious…