Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Birthday Week 2024 Recap: AI Audit, Speed Brain, Developer Tools and more!

In this week’s episode, we recap our main innovation week of the year, Birthday Week, and its many announcements. Host João Tomé is joined by Brendan Irvine-Broque (Group Product Manager) and Kelly May Johnston (Director, Product Management). We dive into some of the key announcements of the week, including the AI audit and major improvements in security, performance, and AI/ML support, such as enhanced threat detection and analytics, faster navigation with Speed Brain, and expanded free tools for all users.

Responsible AI: Policy Solutions for DevSecOps

Artificial intelligence (AI) is revolutionizing problem-solving and innovation in DevSecOps. Leveraging AI responsibly is essential for building secure, trustworthy systems. Governments are crafting policies to ensure AI's benefits while mitigating risks. Join JFrog's VP of Product Marketing, Jens Eckels, and BSA CEO, Victoria A. Espinel, as they explore how BSA’s Policy Solutions for Building Responsible AI provides a framework to achieve these goals, focusing on governance, innovation, and transparency.

Optimizing Tines Stories - Tips and Tricks for Building Efficiently

The goal of Tines is to efficiently automate processes while ensuring that the resulting workflows (also known as stories) are easy for users to understand, regardless of their background in Tines or coding knowledge. When trying to answer the question, “How can I best optimize my Tines stories?”, the answer is: it depends.

Monitor your SentinelOne logs and alerts with Datadog Cloud SIEM

Endpoints, whether physical devices or cloud resources, are critical targets for potential cyberattacks. SentinelOne is an endpoint detection and response (EDR) solution that provides real-time detection of and response to endpoint threats. Using both static and behavioral detections, SentinelOne Singularity Endpoint helps protect against a range of threats, including malware, zero-day exploits, advanced persistent threats, and more.

How companies subject to HIPAA requirements manage sensitive data with Datadog

Healthcare organizations face unique challenges in managing and processing vast amounts of personal information, such as medical records, insurance information, Social Security numbers, and more. To accelerate patient care, these organizations are under pressure to rapidly share this information among providers, insurers, and patients—all within the landscape of a rapidly evolving cloud environment.

Dick's Sporting Goods Cyber Attack Underscores Importance of Email Security and Internal Controls

The recent cyber attack on Dick's Sporting Goods makes it clear that email played a critical role and emphasizes the need for better security controls. Dick’s Sporting Goods is a $12 billion company with more than 800 stores across the United States. That measure of success made the retailer the target of a recent cyber attack. A filing with the U.S.

From Desire Paths to Security Highways: Lessons from Disney's Approach to User-Centric Design

When Walt Disney first unveiled the Magic Kingdom, he made a decision that would revolutionize theme park design - and inadvertently offer a valuable lesson for cybersecurity professionals. Instead of pre-determining where visitors should walk, Disney let guests create their own paths. Only after observing these "desire paths" did Disney pave the official walkways. This approach, seemingly simple, carries profound implications for how we should approach security in our organizations.

Understanding EAR Compliance Regulations: Tips for US and non-US Companies

Coauthored with Eva Galfi, CEO & Principal Consultant, International Trade Advisors Pty Ltd The Department of Commerce’s Bureau of Industry and Security (BIS) implements and enforces the Export Administration Regulations (EAR) to regulate the export, reexport and transfer (in-country) commercial and less sensitive military items. If you need to comply with or learn more about US export control requirements, read our 6 W’s EAR Compliance to help you comply with these strict U.S.

What To Do if a Scammer Has Your Phone Number

If a scammer has your phone number, you should lock your SIM card, secure your online accounts with strong passwords and block spam calls from your phone. With your phone number, scammers can do several things, including target you with phishing attacks, spam calls, spoofing attacks and SIM swapping. These kinds of cyber attacks can lead to your personal information being compromised and even your identity being stolen.