Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Slack DLP Case Study with Bluecore - Nightfall Q&A with Bluecore CISO Brent Lassi (Part 6)

In this segment from one of our previous webinars on Slack data loss prevention (DLP), Nightfall product specialist Michael Osakwe discusses the changing role SaaS applications play in modern organizations with input from Bluecore CISO Brent Lassi about how the pandemic has changed his employees' behavior.

Slack DLP Case Study with Bluecore - Identifying Data Security Risks in Slack (Part 3)

In this segment from one of our previous webinars on Slack data loss prevention (DLP), Nightfall product specialist Michael Osakwe discusses the changing role SaaS applications play in modern organizations with input from Bluecore CISO Brent Lassi about how the pandemic has changed his employees' behavior.

SBOMs are the gifts that keep on giving.

The timing of CISA’s SBOM-a-rama today and tomorrow coincides with the fallout from the “vulnerability of the decade” gifting the industry with yet another example of why scaling and operationalizing the widespread use of SBOMs is so vital. Log4Shell is a 10/10 vulnerability in a hugely popular Java logging library – Log4j – used in virtually every online service. For two decades it was considered harmless, that is until last week when somebody found it wasn’t.

The human element in cybersecurity

According to IBM’s Cost of a Data Breach Report 2021, the global average cost of a data breach is estimated to be $4.24 million. Cyberattacks cost organizations time and money, not only in the form of data loss but also through irreversible damage to their reputations, leading to the loss of customers. After security breaches, customer loyalty is almost impossible to regain.

The Log4j Log4Shell vulnerability: Overview, detection, and remediation

On December 9, 2021, a critical vulnerability in the popular Log4j Java logging library was disclosed and nicknamed Log4Shell. The vulnerability is tracked as CVE-2021-44228 and is a remote code execution vulnerability that can give an attacker full control of any impacted system. In this blog post, we will: We will also look at how to leverage Datadog to protect your infrastructure and applications.