Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

What is GRC in Cyber Security? Why is it Important?

Governance, Risk Management, and Compliance (GRC) in cybersecurity is a framework that is designed to help organizations align their security efforts with business objectives while also managing risks and adhering to legal and regulatory requirements. To implement GRC in Cyber security effectively, it is important to understand the purpose of each element and the part each has to play in improving an organization’s security posture.

Key Indicators of a Strong API Security Program - Do You Have Them? #securitymeasures #securitykey

What does a successful API security program look like? Discover the essential indicators that every organization should monitor, from inventory control to continuous monitoring and anomaly detection. Learn how these key metrics can safeguard your APIs and ensure your defenses are ready for emerging threats!

GitFlops: The Dangers of Terraform Automation Platforms

Terraform is today’s leading Infrastructure-as-Code platform, relied upon by organizations ranging from small startups to multinational corporations. It enables teams to declaratively manage their cloud or on-premises infrastructure, allowing them to provision or decommission infrastructure components simply, consistently, and with auditability.

CVE-2024-42509, CVE-2024-47460: Critical RCE Vulnerabilities Impacting HPE Aruba Networking Access Points

On November 5, 2024, Hewlett Packard Enterprise (HPE), the parent company of Aruba Networks, released a security bulletin addressing two critical-severity vulnerabilities affecting Aruba Networks Access Points. These vulnerabilities, identified as CVE-2024-42509 and CVE-2024-47460, could allow unauthenticated command injection.

The Global Effort to Maintain Supply Chain Security | Part Two

A well-run kitchen requires a fully stocked pantry and a clear understanding of what’s on hand. In cybersecurity, your pantry is your asset inventory—every server, every piece of software, and even those firmware components lurking in the background. You wouldn’t want to cook without knowing exactly what ingredients are available, and you don’t want to secure your supply chain without knowing what’s in your digital inventory.

The Howler Episode 14: Jeff Green, Senior Vice President, R&D

This month we sit down with Jeff Green, Senior Vice President of R&D, as he shares his experience helping open our brand-new India office, leadership advice he swears by, and more! Jeff is an industry veteran with over 30 years of experience in building world-class products and technologies for enterprises and consumers primarily focused in security. Currently as Senior Vice President of R&D, Jeff leads Arctic Wolf’s global research and engineering organization with a focus on delivering security outcomes for customers and ending cyber risk at high scale.

Mastering Classified Systems Artifact Distribution to the Tactical Edge

This JFrog webinar, hosted by our Public Sector partner Carahsoft, focused on automating the secure distribution of critical digital artifacts in air-gapped networks. For agencies, ensuring the integrity of these artifacts at the edge is paramount. Real-time access to mission-critical software for warfighters is essential, and timely software updates boost operational readiness and capabilities. Leveraging JFrog's latest tools, this approach significantly enhances operational capabilities for public sector agencies.