Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

Cloud Unfiltered with Ohad Maislish - Infra as Code - Episode 5

Ohad Maislish discussed cloud infrastructure, DevOps, and the evolution of cloud technologies. Ohad shares his journey from a geek interested in infrastructure to founding M0, focusing on how cloud computing is becoming code with tools like Terraform and Pulumi. They discuss the challenges of platform engineering, the importance of infrastructure as code, and the move towards empowering developers with self-service cloud infrastructure. The dialogue also touches on the significance of open-source projects and the impact of Terraform's licensing changes, leading to the creation of OpenTofu.

Getting #disa #stig compliance straight with a network #digitaltwin #forwardnetworks

How can federal agencies possibly comply with the HUNDREDS of complex specifications in the DISA STIG compliance checklists? Join Mike Lossmann and Federal Technical Solutions Engineer Sean Deveci for this week’s Demo Tuesday to learn how a network digital twin can streamline your federal network compliance and give you full confidence heading into an audit.

How to find #rogue #networkdevices in your network #networkengineer #forwardnetworks

Do you have rogue devices in your network? Worried they might ruin your chill holiday break? Special Guest Jack Shen will show Mike Lossmann how to make a 'naughty list' with Network Query Engine and gain some network peace of mind this year.

Network #digitaltwin plus AI Assist #networksecurity #networkengineer

AI Assist is a groundbreaking generative Artificial Intelligence (AI) feature that is now integrated into Forward Enterprise. This cutting-edge feature empowers NetOps, SecOps, and CloudOps professionals to gain comprehensive network insights and expedite solutions for their most demanding intricate network challenges through natural language prompts.

The 443 Podcast - Episode 282 - A Wild Month in Ransomware

This week on the podcast, we're joined by Ryan Estes, a member of WatchGuard's Zero-Trust Application Service classification team and resident ransomware expert to discuss the wild month in ransomware news. We start the episode with a story about a fake ransomware operator that scammed cybercriminals out of tens of thousands of dollars before discussing two major Ransomware-as-a-Service operators that have had a pretty rough couple of weeks.

The rise of ChatGPT & GenAI and what it means for cybersecurity

The rise of ChatGPT and Generative AI has swept the world by storm. It has left no stone unturned and has strong implications for cybersecurity and SecOps. The big reason for this is that cybercriminals now use GenAI to increase the potency and frequency of their attacks on organizations. To cope with this, security teams naturally need to adapt and are looking for ways to leverage AI to counter these attacks in a similar fashion.

Secure data is superior data: A security-first approach to the DoD Data Strategy

The US Department of Defense (DoD) has vast reserves of data, and the key to warfighter advantage is leveraging relevant data as a strategic asset to gain battlespace operational advantage, accelerating operational multi-domain decision-making at echelon scale.

Nightfall expands its platform to meet modern enterprise DLP challenges

Legacy data leak prevention (DLP) solutions are failing. Simply put, they weren’t built for business environments rooted in SaaS apps and generative AI (GenAI) tools. Meanwhile, security threats are evolving at a breakneck pace, with as many as 95% of enterprises experiencing multiple breaches a year. New attack surfaces are unfurling at a rapid rate following the switch to hybrid and cloud-based workspaces.

CVE-2024-0692: High Severity Remote Code Execution Vulnerability Affecting SolarWinds Security Event Manager

On March 1, 2024, SolarWinds published a security advisory reporting that SolarWinds Security Event Manager (SEM) is vulnerable to a high severity vulnerability that allows an unauthenticated threat actor to achieve remote code execution (RCE), CVE-2024-0692. The vulnerability lies in the configuration of the AMF deserialization endpoints. Exploitation can occur due to insufficient validation of user-provided data, allowing untrusted data to be deserialized.