Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Nightfall AI Rightway Case Study Part 2

Karim Beldjilali, current Nightfall CISO and former CISO of Rightway, speaks about how security has shifted from prevention to safe enablement of collaboration. This informed Karim's selection of security tools as he knew he needed to leverage HIPAA compliance solutions. in line with this philosophy.

Nightfall AI Rightway Case Study Part 3 - Rightway Before & After Nightfall

Karim Beldjilali, current Nightfall CISO and former CISO of Rightway detail Nightfall's 90 day impact on HIPAA compliance initiatives in his former role and why the platform is useful for the security and enablement of secure cloud usage in healthcare settings.

Install the Veracode IntelliJ Plugin

In this video, you will learn how to install the Veracode IntelliJ Plugin, generate API ID and key credentials in the Veracode platform, and store those credentials in IntelliJ. The Veracode IntelliJ Plugin enables you to upload binaries to the Veracode Platform for static security analysis. You can then review the scan results from within IntelliJ IDEA to identify and mitigate potential security findings in your applications.

What is Malware as a Service (MaaS)?

Malware as a Service is the unlawful lease of software and hardware from the Dark Web to carry out cyber attacks. The threat actors who use this service are provided with botnet services and technical support by the MaaS owners. This service opens doors to anyone with minimal computer skills to use and distribute pre-made malware. The data that is stolen is often sold to the highest bidder or left for the service subscribers. MaaS is an illegal version of Software as a Service (SaaS).

Stop Working in Silos: Integrating with APIs

Is your security tool an island? Does it do its singular task with little more to offer than what it says on the package? Too many security offerings behave as singular entities, forcing you to constantly perform task switching to complete a job. If you are using a robust tool, then you may not be taking full advantage of its capabilities. Many capabilities of a good tool can be broadened with the use of an Application Programming Interface (API)

The Top Cyber Attacks of February 2023

It may be the shortest month, but February brought no shortage of bad behavior by cybercriminals. In our latest cyber attack roundup of the ever-thriving world of cybercrime, we look at a disturbing theft from one of the United States’ most secretive government organizations, a long-running ransomware tie-up for a major media company, a never-ending nightmare for a security-minded internet company, and the latest of many breaches for one of the backbones of the modern web.

Building smarter DevSecOps with Intelligent Orchestration

Intelligent Orchestration takes the complexity out of DevSecOps by delivering the right tests, at the right time, to the right people. The modern software development life cycle is characterized by rapid DevOps workflows and CI/CD pipelines. Facebook delivers between 50,000 and 60,000 Android builds each day. Amazon reportedly deploys new software to production every second, and the Netflix DevOps team deploys new releases 100 times each day.