Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Trustwave SpiderLabs' Red Team Flight Tests Microsoft Copilot

The advent and widespread acceptance of Large Language Models (LLMs), such as Microsoft Copilot, by organizations and even average consumers has created another surface threat area that cybersecurity teams must come to understand. To help with this process, Trustwave SpiderLabs conducted a Red Team exercise against a licensed version of Microsoft Copilot.

#158 - Common pitfalls for founders with Andrew Plato, Founder & CEO of Zenaciti

On this episode of The Cybersecurity Defenders Podcast we talk about some of the common pitfalls faced by founders with Andrew Plato, Founder & CEO of Zenaciti. Andrew is an experienced CEO, founder, author, and cybersecurity expert. In 1995, Andrew founded Anitian, one of the earliest cybersecurity companies on record, where he pioneered innovations in intrusion detection, endpoint security, and cloud security. He led the development of a revolutionary automated platform for secure cloud environments, and under his leadership, Anitian formed strategic partnerships with major tech companies like AWS, Microsoft, and Trend Micro before he exited the company in 2022.

Data AI Summit | Expanding Log Analytics and Threat Hunting Natively in Databricks

ChaosSearch + Databricks Deliver on the best of Databricks (open Spark-based data lakehouse) and ELK (efficient search, flexible live ingestion, API/UI) via ChaosSearch on Databricks. Log analytics for observability / security with unlimited retention at a fraction of the cost now with Databricks’ AI/ML. Watch as ChaosSearch CEO, Ed Walsh, shares the power of ChaosSearch in your Databricks environment.

Accelerating Threat Assessment and Risk Mitigation with Nucleus Vulnerability Intelligence Platform

In this webinar, discover how the Nucleus Vulnerability Intelligence Platform (VIP) is changing the way organizations handle vulnerabilities. Learn how VIP empowers security teams to assess, prioritize, and mitigate vulnerabilities in real time by leveraging automated workflows, comprehensive data aggregation, and custom risk ratings. Key topics covered: Chapters Don't forget to like, comment, and subscribe for more in-depth webinars and expert discussions on cybersecurity and vulnerability management!

Complexity of Attack Surface Management in Cloud Environments

Legacy attack surfaces were small and simple. There were fewer servers and endpoints to protect. The tooling required to secure it was basic – perimeter firewalls, antivirus software, and server/network/application monitoring tools. When organizations migrate to the cloud, things change and become complex. For starters, on-premise infrastructure and applications can’t be left out in favor of the cloud. Most organizations run hybrid setups.