Jon GoldmanSAST vs DAST vs SCA vs Secrets scanningMost DevSecOps or AppSec know the difference and could answer what each perform, but do you?3 min read·Mar 31, 2022--1--1
Jon GoldmanHow to prevent against DarkSide Ransomware attacksQuick summary on what DarkSide ransomware is and prevention options4 min read·May 17, 2021----
Jon GoldmanUnderstanding the Kubernetes Attack SurfaceLet’s cover the basics first, the 4C’s is what does that mean. The 4C’s of Cloud Native security are Cloud, Clusters, Containers, and Code…6 min read·May 5, 2021----
Jon GoldmanInteraction with Check Point SandBlast via APIThis article will be useful to those who are familiar with Check Point technologies for emulation of files ( Threat Emulation ) and…4 min read·Apr 15, 2021----
Jon GoldmanDocker Container Security tips and tricksDocker security is an ever-evolving area to be updated about since this part of the technology keeps changing at fast pace. We will cover…2 min read·Mar 24, 2021----
Jon GoldmanWhat is Kubernetes, technically?Kubernetes, also known as K8s, is an open-source system for automating deployment, scaling, and management of containerized applications…4 min read·Feb 12, 2021----
Jon GoldmanSiemplify SOAR and Check Point Software integration and partnershipCheck Point Software didn’t have any strategic relationship with any SOAR solution vendors until Jeff with Amos for lunch. Many thanks to…5 min read·Feb 12, 2021----
Jon GoldmanWhat to do when Ransomware Activity Targeting the Healthcare Sector?TrickBot1 min read·Nov 2, 2020----
Jon GoldmanWAF vs IPS+FW and why you need bothOne of my clients deployed “next-gen firewall” recently with IPS and Firewall, they asked me what the difference is between having a WAF…4 min read·May 3, 2020----