Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

GitHub's Jacob DePriest: How to attract and retain more diverse security talent

In this episode of Future of Security Operations, Thomas speaks with Jacob DePriest, VP & Deputy Chief Security Officer at GitHub, a company with a mission "to help every developer - regardless of experience level - learn, code, and ship software effectively." Before joining GitHub, DePriest spent more than 15 years as a senior executive at the National Security Agency (NSA) in the US.

Navigating the Lack of Standardisation in Cybersecurity for Military Veterans

In this video, James Murphy discusses the issue of standardisation in the transition from the military to the civilian world. Cybersecurity is the perfect example to highlight this issue, as job titles and roles can vary greatly from company to company. He explores the confusion this lack of standardization can cause, and discuss the importance of understanding the differences between job titles and the actual tasks required in the role. Additionally, he discusses the certifications that are highly sought after in the cybersecurity industry, and how they can help military veterans make a smooth transition into this field.

Why K-12 Schools Need Cybersecurity Help from E-Rate

In December 2022, the FCC opened a call for comment requesting stakeholders provide input on whether E-Rate program funds can be used to support advanced or next-generation firewalls and services, as well as other network security services. For those unfamiliar with the program, E-Rate is a Federal Communications Commission (FCC) program that provides funding to schools and libraries for telecommunications and internet services.

The step-by-step guide to threat modeling

Securing your software requires a mix of automated and manual processes, and threat modeling is a crucial part of the mix. Your organization relies on software to innovate and deliver value to your customers, as well as to work faster and more efficiently. However, if that software is not developed and deployed securely, it can put your business at risk. When software risk is business risk, you must both prioritize it and manage it proactively.

Block attackers in your apps and APIs with Datadog Application Security Management

Securing modern-day production systems is complex and requires a variety of measures—from secure coding practices and security testing to network protection and vulnerability scanning. Scaling these solutions to keep pace with the speed of development teams can be difficult, resulting in sprawling workflows and disparate sets of tooling.

Vulnerability Prioritization - Combating Developer Fatigue

We are in early 2023, and we have over 2700 new vulnerabilities registered in CVE. It is still a challenge for developers to endure the fatigue of continually vulnerability prioritization and mitigating new threats. Our findings in the Sysdig 2023 Cloud-Native Security and Container Usage Report provide signs of hope for overburdened developers, as the data showed opportunities to focus remediation efforts on vulnerable packages loaded at runtime.

8220 Gang Continues to Evolve With Each New Campaign

8220 Gang has been dubbed as a group of low-level script kiddies with an equally disappointing name based on their original use of port 8220 for Command and Control (C2) network communications dating back to 2017. Since an initial Talos report in late 2018, the group has continued to use, learn, and benefit from the efforts of their counterparts in the cryptojacking world.