Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Pythons and Birds: Duolingo and Telegram Hacked?

In this week's episode, Bill and Robin explore the dangers of programmatic interfaces! The language-learning website, Duolingo, has fallen victim to an API exploit which has exposed 2.6 million user accounts, and there's threat actors on the dark web who are using Python to subversively change messages in Telegram threads. What's happening in the world, why should you care, and how can you stay protected?

Imparting Trust: Paws for Reflection

In this week's episode, Bill and Robin delve once again into the world of Zero Trust as they discuss how end-to-end encrypted messaging services have fallen victim to the BadBazaar trojan, as well as asking the question "Should you trust URLs on your children's snacks?" Learn all this and more on the latest episode of The Ring of Defense!

Remote Browser Isolation (RBI) with Cato Networks [Demo]

Learn how quick and easy it is to secure your internet traffic using Remote Browser Isolation by Cato Networks! Cato’s Remote Browser Isolation (RBI) service provides secure browsing through a virtualization service that streams web pages safely to the user’s device. In-browser code is executed remotely, keeping users safe from threats such as ransomware and phishing. Cato RBI is also simple to set up. It is accessible in minutes with just a few clicks, unlike some competitors who require complex setup. Cato RBI requires no maintenance: there is nothing to install and nothing to patch.

The NIST CSF 2.0: Framework Governance?

In this week's episode, Bill and Robin discuss the brand-new cybersecurity framework from the National Institute of Standards and Technology. Dubbed the NIST CSF 2.0, this expands on their first iteration by adding a new pillar of 'Governance.' What is the CSF, how is 2.0 different from 1.0, and why should you care? Learn all this and more on the latest episode of The Ring of Defense!

Data Loss Prevention with Cato Networks [Demo]

Learn how quick and easy it is to secure your sensitive information with DLP from Cato Networks! In this video Robin will show you how to configure, and test, DLP Policies in less time than it would take you to drink a coffee. DLP enables organizations to define a set of rules which govern the movement of data to and from their applications. This is achieved by identifying sensitive information which matches defined data types and taking the appropriate action. DLP also identifies the file type of an asset being requested and can prevent its download of so defined.

No Ethical Boundaries: WormGPT

In this week's episode, Bill and Robin discover the dangerous world of an AI tool without guardrails: WormGPT. This AI tool is allowing people with limited technical experience to create potential chaos. When coupled with the rise in popularity of tools like the Wi-Fi pineapple, and Flipper Zero, do you need to be more worried about the next generation of script kiddies? Learn all this and more on the latest episode of The Ring of Defense!

Keeping your SLED Secure: Should you pay a ransom?

In this week's episode, Bill and Robin respond to a viewer request, and delive into the world of State, Local Government and Education, and how they can stay protected and secured with limited budgets. We cover documents issued by the FBI regarding how to stay safe, and also discuss how some OEM vendors are advocating that SLED organisations should just pay whatever ransom has been asked. Will this make the threat actors go away, or will they be here to extort another day?

LockBit hits TSMC: A $70M Ransom?

TSMC, the world’s largest semiconductor manufacturer, has been listed on LockBit’s dark web blog, with the gang demanding $70 million for the stolen data. TSMC states that it was due to their IT hardware suppliers; yet another reason to pay attention to the supply chain. So, who are LockBit, how do they operate, and how can you prevent this from happening to you? Learn all this and more on the latest episode of The Ring of Defense!

What is the Cato Management Application?

Are you looking to get started with Cato Networks, but you're unsure how to begin? Join Robin Johns as he provides you with a tour of the Cato Management Application, and shows you how easy it is to deploy sites, configure users, monitor your applications and performance, while securing your network; all in one place.