Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Cloud Unfiltered with Marc Prioleau - Complexity of Collaborative Mapping - Episode 10

Marc Prioleau of the Overture Maps Foundation discussed the solution and the how and why of how it came to be. Mapping is critical in so many areas and we take for granted how dynamic we expect it to be. This cloud based, open source solution answers the question on how companies can share and contribute to mapping data.

All-in-1 Solution for Kubernetes Cluster Backup, Migration, and DR on Azure & Azure Arc

CloudCasa enhances Kubernetes data protection, simplifying backups, recovery, and migrations across cloud platforms like GCP, AWS, and Azure. Learn about our one-touch solution for cluster backup, migration, replication, and disaster recovery, ensuring your applications are resilient and compliant. Dive into our visual guide on operational continuity with edge devices and more.

Stages of Burnout in Cybersecurity: Recognising the Signs | Razorthorn Security

Unpack the stages of burnUnpack the stages of burnout in the demanding field of cybersecurity out in the demanding field of cybersecurity with this detailed analysis from the Razorwire Podcast. Explore how high energy and engagement initially characterize effective work, but can degrade into ineffectiveness, overextension, and ultimately, disengagement. This episode delves into the psychological progression of burnout, emphasizing the critical point where professionals feel they can no longer manage alone, highlighting the importance of seeking help.

The Hidden Psychological Toll of Cybersecurity Work | Razorthorn Security

Dive into the psychological demands of cybersecurity in this insightful episode of the Razorwire Podcast. Learn how the brain's natural defense mechanisms, such as the amygdala's response to perceived threats, contribute to high burnout rates among cybersecurity professionals. This discussion sheds light on the continuous state of vigilance required in cybersecurity roles and the challenges faced when seeking necessary resources from leadership. Discover why cybersecurity isn't just about technology but also involves battling the ingrained human responses to constant threats.

Securing the Supply Chain - Automating our Way Out of Security Whack-a-Mole

Open-source components forever changed how we build software, but they are also a prominent security threat, nothing illustrated this better than the recent XZ library incident where the world narrowly avoided a massive supply chain attack. Join Gene Gotimer and Mackenzie Jackson to discuss how we can keep our open-source supply chains secure as we discuss: Security implications of vulnerable open-source components How using automation can help us move toward a secure supply chain How to discover and detect vulnerable components.