Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud

AI, Democracy and The Evolution of Internet Security with Bruce Schneier

In this episode, host Joao Tome and cryptographer and security technologist and public policy lecturer, Bruce Schneier discuss the evolving landscape of Internet security. They explore AI-related cybersecurity risks, the impact of new technologies on democracy, and the current state of the global Internet. Schneier examines how new technologies are impacting democratic processes worldwide and provides insights on balancing the delicate balance between privacy risks and benefits in the digital age. The conversation also covers the need for updated regulations and the future of post-quantum cryptography.

Social Media Threats and Regulation with Jenny Reich (Georgetown Law Center)

From our San Francisco headquarters, we sit down with Jenny Reich, a Fellow and Adjunct Professor at the Georgetown Law Center on National Security. As an expert in social media law, Jenny examines social media's impact on misinformation, cybersecurity and journalism. In this episode taped during the 2024 RSA Conference, Jenny offers her expert perspective on growing congressional pressure for social media regulation, the origins of data breaches from chat rooms, Section 230 and TikTok as the new Gen Z search engine.

How AI Impacts Security at SMEs

For small and medium-sized enterprises (SMEs), staying abreast of cybersecurity developments is critical — not just to growth, but to the company’s bottom line. But security evolves quickly, and it can be hard to keep up. In the midst of this fast-evolving security environment, AI has made a bold entrance. So bold, in fact, that only 10% of SMEs aren’t using AI and don’t plan to, according to a recent JumpCloud research report.

Sysdig Sage for CDR: Accelerate analysis, investigation and response

Last year, Sysdig outlined our vision for an AI-driven cloud security assistant. Today, we are excited to announce Sysdig Sage for cloud detection and response (CDR), our new release that embodies our vision. Built upon the core principles we introduced, Sysdig Sage offers actionable insights for cloud environments, with a focus on CDR.

Navigating Cloud Security: A Shared Responsibility

Each July, my family and I take a road trip from Kentucky back to my hometown in northwestern Pennsylvania to spend time on Lake Erie. As tradition dictates, we stop along I-71 for coffee at a branch of a certain coffee shop, which also happens to be my former employer as a teen. (Let’s call it Siren Coffee.) This year, we sat waiting in the drive-thru for a drip coffee for a full 10 minutes.

Sysdig Sage for Cloud Detection and Response

AI has supercharged cloud attacks - they are faster, more complex, and more sophisticated It's time for defenders to harness this powerful technology for good. Meet Sysdig Sage, the first AI cloud security analyst capable of multistep reasoning. Sysdig Sage goes beyond simple summarisation. It is context-aware. It is able to control the UI and move you across the platform. With Sysdig Sage on your side, investigating threats in real time is easier than ever.

Data Security Posture Management: Enhancing Data Visibility and Control to Safeguard Cloud Native Applications

Wednesday, Jul 31st, 2024 Data breaches are a constant threat in today’s cybersecurity landscape, putting organizations’ sensitive information at risk. As businesses move to cloud-native environments, securing data becomes even more crucial. Data Security Posture Management (DSPM) is a proactive approach that helps organizations manage and protect their data assets.

5 Proven Benefits of Managed Cloud Security

Managed Cloud Security is an IT model that involves outsourcing the monitoring and security operations of cloud-based infrastructure to specialised third-party providers. This enables internal IT teams to concentrate on proactive initiatives rather than being bogged down by day-to-day security management, making it a strategic choice for organisations of all sizes. This approach integrates automation to enhance data breach protection, providing real-time threat alerts and ensuring regulatory compliance.

Mastering Cloud Data Protection: Strategies for Resiliency

As the cloud becomes increasingly integral to modern businesses, cloud data protection (CDP) gains importance. From safeguarding against data loss due to accidental deletion or system failures to protecting against cyber threats like ransomware, CDP is the foundation of a resilient cloud strategy. The cloud brings its own set of challenges, from the dynamic nature of containerized workloads to the complexity of multi-cloud environments.