Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar

Account Takeover Attack Live Simulation

Account takeover attacks have increased by 354% y-o-y in 2023. What’s worse? It takes 11 months to solve an ATO breach. By that time, attackers would have laterally traversed your entire digital infrastructure, including databases. So, how do you protect your organisations against sophisticated ATO attacks that even bypass 2FA? In this live attack simulation, Karthik Krishnamoorthy (CTO) and Vivekanand Gopalan (VP of Products) demonstrate various ways in which account takeover can happen, along with practices to protect your websites and APIs against ATO attacks.

Risk Management Essentials: How to Operationalize Risk Reporting

This virtual workshop delves into the core of risk management reporting. Led by our panel of industry experts, this session will equip you with the essential skills to not only analyze and report on organizational risks, but also communicate them effectively to leadership teams. Discover how to construct a robust reporting framework and master the art of presenting metrics with finesse.

Cloud Unfiltered with Chris Aniszczyk - History of CNCF, Linux FDN, KubeCon & the Future - Episode 3

In this episode, Chris Aniszczyk, CTO of Linux Foundation/CNCF sits down with host, Michael Chenetz to discuss the history of the CNCF (Cloud Native Compute Foundation) and where it is going. Additionally, Chris discusses what he expects the trends to be for the next KubeCon in Paris.

A04 2021 Insecure Design | OWASP TOP 10

Welcome to our ongoing series on the OWASP Top 10, focusing on A04:2021 - Insecure Design. In this episode, we delve into the world of insecure design, a critical aspect of application security. You’ll learn what constitutes an insecure design and how attackers can exploit these weaknesses. We’ll walk you through real-world examples of insecure design, helping you understand its impact and the potential risks involved.

Exploring LLM Hallucinations - Insights from the Cisco Research LLM Factuality/Hallucination Summit

LLMs have many impressive business applications. But a significant challenge remains - how can we detect and mitigate LLM hallucinations? Cisco Research hosted a virtual summit to explore current research in the LLM factuality and hallucination space. The session includes presentations from University professors collaborating with the Cisco Research team, including William Wang (UCSB), Kai Shu (IIT), Danqi Chen (Princeton), and Huan Sun (Ohio State).