Jon GoldmanSAST vs DAST vs SCA vs Secrets scanningMost DevSecOps or AppSec know the difference and could answer what each perform, but do you?Mar 31, 20221Mar 31, 20221
Jon GoldmanHow to prevent against DarkSide Ransomware attacksQuick summary on what DarkSide ransomware is and prevention optionsMay 17, 2021May 17, 2021
Jon GoldmanUnderstanding the Kubernetes Attack SurfaceLet’s cover the basics first, the 4C’s is what does that mean. The 4C’s of Cloud Native security are Cloud, Clusters, Containers, and Code…May 5, 2021May 5, 2021
Jon GoldmanInteraction with Check Point SandBlast via APIThis article will be useful to those who are familiar with Check Point technologies for emulation of files ( Threat Emulation ) and…Apr 15, 2021Apr 15, 2021
Jon GoldmanDocker Container Security tips and tricksDocker security is an ever-evolving area to be updated about since this part of the technology keeps changing at fast pace. We will cover…Mar 24, 2021Mar 24, 2021
Jon GoldmanWhat is Kubernetes, technically?Kubernetes, also known as K8s, is an open-source system for automating deployment, scaling, and management of containerized applications…Feb 12, 2021Feb 12, 2021
Jon GoldmanSiemplify SOAR and Check Point Software integration and partnershipCheck Point Software didn’t have any strategic relationship with any SOAR solution vendors until Jeff with Amos for lunch. Many thanks to…Feb 12, 2021Feb 12, 2021
Jon GoldmanWhat to do when Ransomware Activity Targeting the Healthcare Sector?TrickBotNov 2, 2020Nov 2, 2020
Jon GoldmanWAF vs IPS+FW and why you need bothOne of my clients deployed “next-gen firewall” recently with IPS and Firewall, they asked me what the difference is between having a WAF…May 3, 2020May 3, 2020