Cybersecurity Summer 2022 Round-Up

Featured image by Dan Nelson on Unsplash

THE AT&T SECURITY CONFERENCE
THE AT&T SECURITY CONFERENCE
Cybersecurity & CloudExpo

Palo Alto Networks

Prepare to dive deep into the industry’s most comprehensive security orchestration

It’s time to level up your SOC skills with Cortex® XSOAR™!

AT&T Cybersecurity

AT&T: I Am Buying The Dip

  • After stripping off all the flashy stuff that underperformed, the core of AT&T returns to offer reliable cash flow.
  • Q2 results, despite the small cut in FCF, hit it out of the park with its best quarter for subscriber growth.

AT&T SASE Branch with Fortinet:

With the rise of cloud-based applications and tools to support new business initiatives, organizations with multiple branch locations are switching from legacy wide-area networks (WANs) to software-defined WAN (SD-WAN) architectures. SD-WAN offers faster connectivity, cost savings, and performance for software-as-a-service (SaaS) applications as well as digital voice and video services.

Secure Access Edge Access (SASE):

A unified, comprehensive approach to networking and security for the modern enterprise.

Adopting a single, cloud-delivered solution in place of disparate point products helps organizations:

  • Reduce complexity
  • Rapidly scale out remote workers and branch locations
  • Deliver consistent security policy enforcement to all users, regardless of location.

What is more important, the reduction in complexity and overhead frees up technical, financial, and human resources to help businesses better position themselves for future opportunities and growth.

AT&T SASE
SASE: a stronger, more secure network.
CISCO Meraki

DevSecOps Highlights

DevOps.com webinars: Modern Data Protection With Metallic DMaaS: Hybrid, Kubernetes and Beyond Wednesday, August 24, 2022

With the acceleration of hybrid cloud adoption and digital transformation initiatives, data is in more places than ever.  From containers and on-premises environments to cloud and SaaS-based applications, businesses need a smart strategy to protect their entire data estate from today’s threats. And while native tools provide businesses with high availability, they are not enough. In this session, Metallic’s CTO David Ngo unpacks the critical need for dedicated data protection, the advantages of purpose-built solutions and how Metallic DMaaS safeguards data from deletion, corruption and ransomware attacks no matter where your data lives.

SKILup Day: Enterprise Open Source
  • Learn how to identify key aspects of open source security
  • Learn how robust security practices are actually possible in Kubernetes
  • Understand the realities of today’s open source software and the real risks that all organizations and industry professionals should be aware of
  • Learn what machine learning is and what place AI has in IT operations
  • Understand how to establish a zero-trust profile for an application, as it makes its way across Dev/Test, Q/A and eventually to a production cluster.

Top 5 Cloud-Native Risks

  • Application Vulnerabilities
  • Infrastructure misconfigurations
  • Malware
  • Overprovisioned access
  • Insecure APIs

Best Practices:

  • Team mindset
  • Reducing complexity with a platform approach
  • Choosing cloud-native technology
  • Automating security
  • Gaining visibility across all data and workloads

IT GRC Forum

CPE Webinar: Utilizing the NIST Framework for Full-Cycle Privilege Orchestration Sept. 8 @ 1pm EST
IT GRC Forum CPE How to effectively communcate cybersecurity risks to the Board

Snowflake Security

The unique Snowflake design physically separates but logically integrates storage and compute along with providing services such as security and management. The cloud services layer manages data security including the security for data sharing.

Along with tables, Snowflake views are the primary objects maintained in database

schemas.

One purpose of views is to display selected rows and columns from one or more

tables. This is a way to provide some security by only exposing certain data to specific users. There is the ability for views to provide even more security by creating a specific secure view of either a non-materialized or materialized view.

Snowflake layered security
Layered Security

Creating multiple layers of security that take advantage of Snowflake’s built-in security options is among the best practices for managing security.

Digital Shadows Digest

  • On-Demand Webinar: Digital Risk Protection in a Modern Threat Landscape
  • Data Leakage Detection Solutions Guide
  • Detecting Fake Social Media Profiles | Case Study
  • Dark Web Marketplace Trends
  • Cyber Threat Intelligence Solutions Guide
  • Vulnerability Intelligence Solutions Guide

ksqlDB Security

  • ksqlDB supports several combinations of encryption and authentication on its client-facing and internal endpoints. ksqlDB also supports many of the security features of the other services it communicates with, like Apache Kafka® and Schema Registry.
  • You can use ksqlDB with a Kafka cluster in Confluent Cloud.
  • You can secure installations of ksqlDB outside of Confluent Cloud, like on-premises installations or manual installations on other cloud platforms.

AIaaS Data Security

AIaaS Data Security Issues

Related Online Events

E-Training Opportunities

Further Reading

Cybersecurity Monthly Update

News

Cloud Tech Trends June 2022

Data-Driven ML Credit Card Fraud Detection

One response to “Cybersecurity Summer 2022 Round-Up”

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: