Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CyberArk

EP 29 - Synthetic Identity: Unmasking a New AI-Fueled Cyber Threat

Scattered across the internet are jigsaw puzzle pieces containing your personal information. If reassembled by an attacker, these puzzle pieces could easily compromise your identity. Our returning guest today is Len Noe, CyberArk’s resident transhuman (a.k.a. cyborg), whose official titles these days are Technical Evangelist, White Hat Hacker and Biohacker.

Cyber Breach Remediation's 5-Step Cycle

Organizations tend to fall into two categories: those that have been breached and those that don’t yet realize they’ve been breached. If you belong to the first group, believe it or not, you’re in luck. Once the breach has been acknowledged, your organization is closer to fixing the problem and overcoming the damage.

EP 28 - Safeguarding Data in the Cloud

In this episode of the Trust Issues podcast, host David Puner interviews Brad Jones, CISO and VP of Information Security at Seagate Technology. They delve into cloud security challenges, including protecting data in a constantly shifting technological landscape. Jones discusses the importance of establishing trust as a data company and implementing rigorous controls to safeguard sensitive information.

Red Hat and CyberArk Develop an Approach To Centralize and Automate Secrets Management

Discover the power of Red Hat and CyberArk as they join forces to revolutionize your security practices. Say goodbye to being controlled by secrets and embrace a centralized, automated approach that guarantees a secure environment without compromising your freedom. Explore the ultimate solution to keep your systems protected while enjoying enhanced flexibility. Watch now and unlock a new era of cybersecurity!

The Seven Types of Non-human Identities to Secure

Non-humans are everywhere these days. Sure, you’ve seen the much-deserved hype about how AI-powered tools like ChatGPT are going to change everything. But there are plenty of more mundane non-human entities that you interact with in your daily life: the smart thermostat program that knows to cool down your house at a certain time every day, the application on your phone that suggests directions to a place you’ve searched for, and many others.

How to Write a PoC for an Uninitialized Smart Contract Vulnerability in BadgerDAO Using Foundry

In this post, we’re going to learn how Foundry can be used to write a proof of concept (PoC) for uninitialized smart contract vulnerabilities. We will take a look at and exploit a simple uninitialized smart contract vulnerability we found in BadgerDAO. If you are familiar with this type of vulnerability, jump straight to the Foundry PoC section. You can also find the PoC code on this GitHub repository.