Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Information Security Controls | Different Types and Purpose Explained

Information security controls are a critical aspect of information technology and an integral part of safeguarding your company’s data. This video provides an overview of the types and purposes of different security controls, including firewalls, intrusion detection systems (IDS), and encryption.

Practice vs Maturity in CMMC 2.0 Framework

When CMMC was first introduced by the DoD, its purpose was to “normalize and standardized cybersecurity preparedness across the federal government’s Defense Industrial Base or DIB.” Essentially, they recognized a weakness in cybersecurity hygiene practices in their supply chain, and so CMMC became the standard the DIB would be “graded” by to ensure the protection of sensitive or Controlled Unclassified Information (CUI).

Flow Use Case: Limit Intruder Dwell Time

In this use case, a hypothetical attacker used an exploit against our machine in the local network, which triggered an alert from an external security service. Our external service does not provide additional details about the threat. We will use this Flow to combine the external service data and the data extracted by Devo to check if there's any data flow from the victim to the attacker.

Log4j Log4Shell Vulnerability: All You Need To Know

On December 9, 2021, a researcher from the Alibaba Cloud Security Team dropped a zero-day remote code execution exploit on Twitter, targeting the extremely popular log4j logging framework for Java. Since then, the trivially exploitable (weaponized PoCs are available publicly) and extremely popular library has reportedly been massively exploited and has gotten wide coverage on media and social networks.

Kroger Uses JFrog Xray for Software Security and License Compliance

Kroger leverages the JFrog platform to give developers visibility into their software vulnerabilities and make informed decisions on what to fix. See how Kroger has implemented secure DevOps processes with automated vulnerability scanning and open-source software (OSS) license compliance capabilities to support their development and security teams.

Slack DLP Case Study with Bluecore - Best Practices for Maintaining Slack Data Security (Part 5)

In this segment from one of our previous webinars on Slack data loss prevention (DLP), Nightfall product specialist Michael Osakwe discusses the changing role SaaS applications play in modern organizations with input from Bluecore CISO Brent Lassi about how the pandemic has changed his employees' behavior.