Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Digital Arrests: The New Frontier of Cybercrime

The intricate world of cybercrime continues to evolve, and with it emerges a disturbing trend known as "digital arrests." In this scam, fraudsters manipulate technology to instil fear, isolate victims, and ultimately extort them for financial gain. Reports indicate that digital arrests are on the rise globally, leading to devastating consequences for individuals and businesses alike.

Understanding Multi-Factor Authentication

When 23andMe, the popular genetic data gathering and sharing organization, was breached in November of 2023, the threat actors responsible gained initial access by launching a credential stuffing attack. The attack, which involved hackers using credential stuffing, or entering known passwords and emails to see if a combination would work, only succeeded due to a lack of multi-factor authentication (MFA) in place in the compromised account.

Cloud Unfiltered with Travis Runty - Cloud Native Trends - Episode 7

Welcome to this exciting edition of Cloud Unfiltered, where your host Michael Chenetz, delves into the intricate world of cloud computing with special guest Travis Runty, the CTO of Public Cloud at Rackspace. With almost 17 years of experience at Rackspace, Travis brings a wealth of knowledge from his journey as an engineer, architect, and delivery lead, to leading public cloud strategy.

Panoptica: Cloud application security done better

Panoptica, Cisco’s cloud native application security platform provides contextualized cloud security to identify, prioritize, and remediate security risks and misconfigurations in complex cloud environments. The unified cloud security platform makes every stage of cloud security simple from “code to cloud,” providing software supply chain protection, cloud workload and runtime protection, cloud security posture management (CSPM), security for API communication to and between your microservices, and cloud detection and response (CDR) for realtime security protection.

Telephony Or VoIP Device Accessible Issue And How To Fix It On Your Scorecard

Is the "Telephony/VoIP Device Accessible" issue type bringing your rating down and you don't know what to do about it? Watch this short video which explains what these are and what you can do to improve them. SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.

The Future of Robotics in Security: Opportunities & Risks

In today's rapidly evolving tech landscape, the integration of robotics into security systems presents both incredible opportunities and significant challenges. At Brivo, we're at the forefront of harnessing the power of smart spaces technology to enhance security automation and elevate the experience for employees and tenants alike. 🤖💼

Ransomware Reality Check: Investing in Cybersecurity Pays Off | Razorthorn Security

Dive into the intriguing world of cybersecurity and ransomware recovery in this thought-provoking video. As news broke about a $100 million ransomware operation being halted, initial reactions ranged from skepticism to amusement. However, the swift return of these cybercriminals highlights the resilience and adaptability of such groups.

Rethinking Law Enforcement Tactics in Cybersecurity Breaches | Razorthorn Security

Delve into the intricate world of cybersecurity breaches and law enforcement tactics in this insightful video. Uncover the root cause of breaches, such as the PHP vulnerability, shedding light on the pervasive challenge of patch management across industries. Critically analyze law enforcement's approach to handling cyber threats, as the decision to gamify the response raises questions about effectiveness and strategy. Should threat intelligence be wielded differently? Is there a missed opportunity in monitoring and gathering intelligence over time rather than immediate action?

This Month in Datadog: DASH 2024 preview, Datadog Security for Google Cloud, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. To learn more about Datadog and start a free 14-day trial, visit Cloud Monitoring as a Service | Datadog. This month, our Spotlight is a preview of our annual conference, DASH 2024.

[Downloadable Template] How to audit your outdated security processes

As your business grows, there are new demands of the security team, like adding additional compliance frameworks, more security questionnaires, or new, advanced requirements from large enterprise customers. ‍ While this growth is exciting, it also comes with growing pains — like outgrowing your existing security processes.