Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How we created the first conversational AI cloud security analyst

In the rapidly evolving landscape of cybersecurity, the need for a robust and intelligent assistant capable of analyzing, summarizing, and reacting to events is paramount. This is why we designed Sysdig SageTM, our large language model (LLM)-based cloud security analyst, to be an expert in cloud detection and response (CDR). Sysdig Sage excels at summarizing complex events and providing clear explanations, which is crucial for identifying and promptly reacting to potential threats.

Ransomware Kingpin Who Called Himself "J P Morgan" Extradited to the United States

An investigation dating back almost ten years has seen the extradition this week to the United States of a man suspected to be the head of one the world's most prolific Russian-speaking cybercriminal gangs. The UK's National Crime Agency (NCA) says it has been investigating a cybercriminal using the online handle "J P Morgan" since 2015, alongside parallel investigations run by the United States FBI and Secret Service.

Detecting Out-of-Bounds Memory Access, Which Caused The Crowdstike's Incident

The Crowdstrike incident is a recent example of out-of-bounds memory access in C/C++ causing a crash. CrowdStrike reported that problematic content in Channel File 291 triggered an out-of-bounds memory read, leading to a Windows operating system crash (BSOD). Another critical example with the exact root cause is the Heartbleed vulnerability, which affected the OpenSSL library. Remarkably, fuzz testing could identify this issue in less than 10 seconds. Watch the video to see fuzz testing in action.

Get Visibility Into the Cloud: Craig and Mike Secure the World, One Cloud at a Time

Mike Lossmann and Craig Johnson discuss enhancing cloud visibility for an upcoming audit, demonstrating how to ensure security in cloud environments. Highlights Craig explains the importance of knowing the cloud’s security posture. Forward Enterprise shows full multi-cloud visibility between cloud zones. Analysis reveals potential security gaps. Querying the entire cloud model identifies misconfigurations. Historical data allows for forensic analysis post-breach. Users can prepare for audits without last-minute scrambling.

We Made It! Nucleus Placed 267 on Inc. 5000 Fastest Growing Companies

This week, Nucleus can add another accolade to a growing list, being listed as number 267 on Inc. Magazine’s list of the 5000 fastest-growing companies in America. We are proud of the growth we’ve achieved as a company and the potential for the future at Nucleus. Looking more closely at the results, we are the fourth fastest-growing security company on the list. As many people know, the cybersecurity and technology market has been tumultuous recently.

Top 7 Practices to Prevent Data Leakage through ChatGPT

Generative AI (GenAI) tools like ChatGPT have already become indispensable across organizations worldwide. CEOs are particularly enthusiastic about GenAI’s ability to let employees “do more with less”. According to the McKinsey Global Survey on the State of AI in 2024, 65% of organizations already use GenAI tools extensively, and Gartner forecasts that this number will reach 80% by 2026.

Guide: Verifying Microsoft Verified ID with a WordPress Plugin | Digital & Decentralized Identity

Follow our step-by-step instructions to set up and verify Microsoft Verified ID using a WordPress plugin. We’ll cover everything from plugin installation to configuration, so you can confidently manage digital identities on your site.

Continuous Accountability: Leveraging Contracts to Secure your Supply Chain

A critical problem for security and legal professionals who manage supply chain risk is that cybersecurity risks are dynamic and always shifting. You have done your due diligence and selected a vendor with strong cybersecurity controls – but how can you guarantee that your vendor maintains this type of security hygiene and doesn’t become a target and a “weak link” in your supply chain?