Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Protecto Snowflake Integration Demo: Safeguard Sensitive Data!

Welcome to the Protecto Snowflake Integration Demo, where we show you how to safeguard sensitive data using Protecto’s advanced AI-powered masking tools! In today’s world, businesses using Snowflake for AI and analytics face significant risks with sensitive information hidden within unstructured data like comments and feedback columns. Protecto provides a unique solution, precisely masking only the sensitive parts of your unstructured data while leaving the rest untouched, ensuring your datasets remain valuable for analysis.

Birthday Week 2024 Recap: AI Audit, Speed Brain, Developer Tools and more!

In this week’s episode, we recap our main innovation week of the year, Birthday Week, and its many announcements. Host João Tomé is joined by Brendan Irvine-Broque (Group Product Manager) and Kelly May Johnston (Director, Product Management). We dive into some of the key announcements of the week, including the AI audit and major improvements in security, performance, and AI/ML support, such as enhanced threat detection and analytics, faster navigation with Speed Brain, and expanded free tools for all users.

Responsible AI: Policy Solutions for DevSecOps

Artificial intelligence (AI) is revolutionizing problem-solving and innovation in DevSecOps. Leveraging AI responsibly is essential for building secure, trustworthy systems. Governments are crafting policies to ensure AI's benefits while mitigating risks. Join JFrog's VP of Product Marketing, Jens Eckels, and BSA CEO, Victoria A. Espinel, as they explore how BSA’s Policy Solutions for Building Responsible AI provides a framework to achieve these goals, focusing on governance, innovation, and transparency.

Optimizing Tines Stories - Tips and Tricks for Building Efficiently

The goal of Tines is to efficiently automate processes while ensuring that the resulting workflows (also known as stories) are easy for users to understand, regardless of their background in Tines or coding knowledge. When trying to answer the question, “How can I best optimize my Tines stories?”, the answer is: it depends.

Monitor your SentinelOne logs and alerts with Datadog Cloud SIEM

Endpoints, whether physical devices or cloud resources, are critical targets for potential cyberattacks. SentinelOne is an endpoint detection and response (EDR) solution that provides real-time detection of and response to endpoint threats. Using both static and behavioral detections, SentinelOne Singularity Endpoint helps protect against a range of threats, including malware, zero-day exploits, advanced persistent threats, and more.

How companies subject to HIPAA requirements manage sensitive data with Datadog

Healthcare organizations face unique challenges in managing and processing vast amounts of personal information, such as medical records, insurance information, Social Security numbers, and more. To accelerate patient care, these organizations are under pressure to rapidly share this information among providers, insurers, and patients—all within the landscape of a rapidly evolving cloud environment.

Dick's Sporting Goods Cyber Attack Underscores Importance of Email Security and Internal Controls

The recent cyber attack on Dick's Sporting Goods makes it clear that email played a critical role and emphasizes the need for better security controls. Dick’s Sporting Goods is a $12 billion company with more than 800 stores across the United States. That measure of success made the retailer the target of a recent cyber attack. A filing with the U.S.

From Desire Paths to Security Highways: Lessons from Disney's Approach to User-Centric Design

When Walt Disney first unveiled the Magic Kingdom, he made a decision that would revolutionize theme park design - and inadvertently offer a valuable lesson for cybersecurity professionals. Instead of pre-determining where visitors should walk, Disney let guests create their own paths. Only after observing these "desire paths" did Disney pave the official walkways. This approach, seemingly simple, carries profound implications for how we should approach security in our organizations.

Understanding EAR Compliance Regulations: Tips for US and non-US Companies

Coauthored with Eva Galfi, CEO & Principal Consultant, International Trade Advisors Pty Ltd The Department of Commerce’s Bureau of Industry and Security (BIS) implements and enforces the Export Administration Regulations (EAR) to regulate the export, reexport and transfer (in-country) commercial and less sensitive military items. If you need to comply with or learn more about US export control requirements, read our 6 W’s EAR Compliance to help you comply with these strict U.S.