Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

How to Install CurrentWare On-Premises (Tutorial) - Computer Monitoring Software | CurrentWare

In this video Mike, one of CurrentWare’s technical specialists, will show you how to install CurrentWare's device control, web filtering, and computer monitoring software on-premises. After completing this tutorial you will be able to monitor and control your user’s computers from CurrentWare’s central management console. If you would like to learn how to use CurrentWare to monitor remote workers, that topic is covered in another tutorial.

Executive Order Update: NIST Establishes a Definition for Critical Software and Outlines Scan Requirements for Software Source Code

On May 12, 2021, President Biden announced an executive order to improve the nation’s cybersecurity. The order, which outlines security initiatives and timelines, calls for the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) to enhance the security of the software supply chain.

Top 5 NCSC Cloud Security Principles for Compliance

There are many important factors to consider when choosing a cloud provider for your cloud use cases. For organizations in heavily regulated industries, compliance with relevant regulations is one of the most important things to think about. Whether you’re planning for a single cloud workload or a hybrid multi-cloud setup, maintaining compliance for sensitive data in the cloud is imperative.

CISO Interview Series: How Aiming for the Sky Can Help Keep Your Organization Secure

Organizations need the right internal personnel like a CISO to keep their systems and data secure. But what kind of skills do these leaders need? And how should they guide their employers in a way that doesn’t overlook the evolving threat landscape? To find out, I spoke decided to speak with Goher Mohammad. Goher is the Group Head of Information Security (CSO) for L&Q. He has held that position there for just under three years.

ICYM: 4 lessons for securing codebases from secrets exfiltration

Last month we hosted a webinar dedicated to discussing the issue of codebase security. As trends like secrets and credential exfiltration continue to be of concern within systems like GitHub, threats, such as cryptojacking and supply side attacks, have become more of a problem. This makes understanding key aspects of codebase security very important. That’s why we pulled out 4 lessons from our recent session that developers and security engineers must know.

GitHub DLP Webinar - Examples of Codebase Data Breaches (Part 2)

In this segment from one of our previous webinars on GitHub data loss prevention, Nightfall AI product specialist Michael Osakwe provides detailed examples of secrets leaks and exfiltration that occurred on GitHub. These incidents illustrate the risk of not just exposing cloud systems but stakeholder information as well.

GitHub DLP Webinar - Modeling the SaaS Threat Landscape (Part 3)

In this segment from one of our previous webinars on GitHub data loss prevention, Nightfall AI product specialist Michael Osakwe illustrates the risk SaaS systems like GitHub pose by providing a model of the SaaS threat landscape. In this model, he explains how fundamental aspects of SaaS systems can lead to increased security risks if not taken into account.

GitHub DLP Webinar - Best Practices for Securing Codebases (Part 4)

In this segment from one of our previous webinars on GitHub data loss prevention, Nightfall AI CTO and co-founder Rohan Sathe shares 8 critical best practices that developers and security engineers must keep top of mind in order to protect secrets in codebases and maintain good DevSecOps.

Graylog Illuminate: Getting Started with Sysmon

The Windows System Monitor (Sysmon) is one of the chattiest tools. With all the information coming in, it can be difficult and expensive to use it efficiently. However, the Graylog Illuminate package gives you a way to fine-tune it so that you can get better data and manage your ingestion rate better. Sysmon gives you awareness of what’s going on in your endpoints.