Podcast-Ep-2.1- ML, Automation & ShiftLeft at CapitalOne — A conversation with Vincent Weafer

Podcast-Ep-2.1- ML, Automation & ShiftLeft at CapitalOne — A conversation with Vincent Weafer

Podcast-Ep-2.1- ML, Automation & ShiftLeft at CapitalOne — A conversation with Vincent Weaferhttps://medium.com/media/d9752cdc858ba8e31c8a1e8e4b8dba93/hrefVincent Weafer, SVP Security Engineering at Capital One in a conversation with Alok Shukla, VP Product Management at ShiftLeft and host of ...
data breach

Survey Finds Data Breach Costs Rising

The cost of a data breach is now $3.86 million per breach on average, according to a newly released survey of organizations that suffered a breach over the past year. Conducted by ...
Security Boulevard
On the Road to DevSecOps: Top Three Benefits of CxFlow

On the Road to DevSecOps: Top Three Benefits of CxFlow

Most organizations who are in the process of transitioning to DevOps understand that this new software development methodology is really about a change of corporate mindset, improvements to internal practices, and the ...
asset management

How To Improve Asset Management and Security

The future of asset management requires organizations invest in digitization, which has the added benefit of improving security You would be amazed at how many organizations still use archaic technologies to keep ...
Security Boulevard
ML firewalls

Palo Alto Networks Embeds ML Models in Firewalls

Palo Alto Networks (PAN) today unveiled a series of next-generation firewalls (NGFW) that rely on machine learning (ML) models running inline rather than signatures to thwart cybersecurity threats in real-time. Anand Oswal, ...
Security Boulevard
8 Best Practices for Secure Remote Work Access

8 Best Practices for Secure Remote Work Access

As more and more employees have transitioned to working remotely, the cybersecurity threats that their organizations face have changed. While... The post 8 Best Practices for Secure Remote Work Access appeared first ...

Workflow Automation: Publishing Artifacts to Nexus Repository using Jenkins Pipelines

In this guide, we will use Jenkins as a Continuous Integration server and Nexus Repository as a build repository. The goal of this guide is to create a workflow where we can ...
access

Access Governance Helps Ensure Network Security Compliance

Protecting your company’s priceless data means making sure of two things: that the right people have access to the correct files and applications, and that the wrong people don’t have access to ...
Security Boulevard
automation

Automation: Helping Speed Vulnerability Response

Automation can help organizations respond to vulnerabilities faster and improve their security posture Enterprises across the globe are recognizing the benefits of automation. From streamlining HR’s onboarding process to automating IT help ...
Security Boulevard

DevSecOps Delivered: Automated GitHub Pull Requests

In this episode of DevSecOps Delivered, we demonstrate how to use the Github automated pull requests integration in Nexus Lifecycle. You'll learn: How the Jenkins integration works How source control management (SCM) ...