Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

Understanding CMMC 2.0: New Rules, Guidelines, and Timelines

2025 may seem far off, but the reality is that CMMC is no longer on the distant horizon; it is knocking on our door. In an industry where the compliance process is long and the market of assessors is far fewer than needed, taking a proactive approach is a must. Join CISO Global's Gary Perkins, Baan Alsinawi, Tom Cupples, and special Guest Ben Bryan on February 21st as they discuss CMMC 2.0, the new rules and guidelines that come with it, and what your compliance timeline may look like.

Fastly's Andrew Santell on going from the Navy to Netflix and breaking free of bad processes

On this episode of The Future of Security Operations podcast, Thomas is joined by Andrew Santell. Andrew is an experienced security leader who worked for the U.S. Navy for over a decade before moving into the private sector. In 2021, he founded the Security Operations program at Netflix, and recently, he joined edge cloud platform Fastly, where he is the Director of Security Operations and Cyber Defense.

Introducing fAST Dynamic to the Polaris Software Integrity Platform | Synopsys

Now a part of the Polaris Software Integrity Platform, fAST Dynamic provides next generation dynamic analysis at scale. fAST Dynamic is a DAST solution that provides an automated, self-service dynamic testing solution for effectively analyzing modern technologies that is fast, easy, and accurate.

A10 Defend Threat Control: DDoS Defense Reimagined

An addition to the A10 Defend suite has arrived. A10 Defend Threat Control, a necessary and proactive DDoS intelligence SaaS platform, is here to establish and amplify your holistic DDoS defense system. Backed by A10’s proprietary “zero-atrophy” data gathering and validation method, Threat Control provides actionable insights and proactively establishes a first layer of defense for your DDoS protection needs.

The Different Types of Authorization Models

Authorization plays an important role in Identity Access Management (IAM). IAM is a security framework of business policies and processes designed to ensure that authorized users have the necessary access to perform their jobs. Choosing the correct authorization model for your organization is important to protect sensitive resources from unauthorized access.

Snyk's AppSec dream team

With springtime just around the corner, there’s a lot to be excited about — warmer weather, longer days, and, most importantly, basketball! In honor of the upcoming March Madness tournament, we’ve put together our own dream team for AppSec. Read on to discover the all-star features in application security this year and how they can help your team get a slam dunk in protecting applications from code to cloud.

The First CNAPP with Out-of-the-Box NIS2 and DORA Compliance

In an era where cloud attacks and threats are happening very fast and constantly evolving, the European Union (EU) has stepped up its cybersecurity game with two new regulations: the Digital Operational Resilience Act (DORA) and the revised Directive on Security of Network and Information Systems (NIS2). With more strict requirements on compliance controls and breach disclosures, these regulations are set to transform how businesses manage their cyber risks in Europe.