Post Tagged with: "gf_row"

How People.AI Reduced Cloud Configuration Issues by 97% | Case Study
People.ai relies heavily on Terraform and AWS for its cloud infrastructure. With over 10,000 resources in their infrastructure, gaining visibility and reducing security risks was proving to be difficult and time-consuming. As they constantly evolved their configured resources and scaled their cloud infrastructure footprint, they wanted to stay on top of best practices in keeping their environments secure.

Putting the Sec in DevSecOps | Talk Recording
Planning, provisioning, and changing infrastructure are vital to rapid cloud application development. Incorporating infrastructure-as-code into software development promotes transparency and immutability and helps prevent bad configurations upstream.

Cloud DevSecOps With Bridgecrew and Terraform | Hands-on Workshop Recording
Gain hands-on experience with the help of experts from Bridgecrew and Hashicorp! From scanning infrastructure as code (IaC) for security misconfigurations to implementing automated DevSecOps workflows, this workshop will provide a hands-on experience to automate your cloud security.

The DevSecGuide to Infrastructure as Code
In this guide, we’ll explore the challenges of leveraging DevSecOps to secure the cloud and how infrastructure as code (IaC) makes it all possible.

Real Examples of Third-Party Risk: Lawsuits, Millions of Dollars, and Reputational Damage
Securing your own organization against threat actors is hard enough. Add in all of the ways you can be exposed to danger through your third-party vendors and the idea of being fully secure seems nearly impossible.

How Brand Protection Safeguards Your Customers and Your Reputation
Your organization’s most important asset is its brand. The brand encompasses everything — the people, services, products, interactions — that comes to mind when thinking about your organization. Any damage done to your brand as a whole has an outsize effect and can cause the public to lose trust, and ultimately choose another option.

Patch What Matters with Risk-Based Vulnerability Management
Patching vulnerabilities is critical for protecting an organization’s data and assets. 60% of breaches have been linked to a vulnerability where a patch was available but not applied. However, identifying which vulnerabilities are a priority is difficult, and relying on CVSS scores alone won’t do the job.