Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

A Formula For Success Ep 4: Lewis Hamilton, Mercedes-AMG F1 driver & George Kurtz, CrowdStrike CEO

In this fourth installment of A Formula For Success, FIA Formula One™ 7-time World Drivers Champion Lewis Hamilton spoke with CrowdStrike CEO George Kurtz just before the dramatic conclusion of the 2021 US FIA Formula One™ Grand Prix. Listen to their passionate conversation on coping with extreme pressure and their drive to be best in class.

Webcam security in the age of Zoom

The trusty webcam used to be a “nice to have” for the occasional job interview, virtual hangout, or simple YouTube recording. But that all changed when the pandemic started. In just a few months it became a daily tool for people around the world, from fully remote businesses to families and friends kept apart in lockdown.

What is Red Teaming? - A Cyber Security Methodology

Red Teaming is a cyber security methodology that uses simulations and attacks to identify an organization's vulnerabilities. In this video, we explore what red teaming is, how it works, and some of the benefits it can provide.#redteaming #cybersecurity Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

Apple Cyber Attacks: Mobile Devices Still at Risk

Apple iPhone users are one of the largest targets when it comes to cyber-attacks. Apple uncovered its biggest hack in history last November, which went undetected for five years. At the time they alerted users who had fallen victim to the colossal Apple cyber attack. The hack targeted Apple’s iCloud service and was able to gain access to users’ photos, videos, and other personal information.

Lessons From Billions of Breached Records by Troy Hunt of https://haveibeenpwned.com

Security flaws, hackers and data breaches are the new normal. It’s not just those of us in the industry facing these foes every single day; it’s everyone. Whether you’re online or offline, you simply cannot exist today without your personal information being digitized in systems which are often left vulnerable and exploited at the whim of attackers. But who are these people — the ones who seek to break through our defenses and exploit our data? And how are they continually so effective at doing so, despite our best efforts?