Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Hunting the XZ Backdoor (CVE-2024-3094) | Threat SnapShot

Welcome back to another episode of SnapAttack's Threat SnapShot! I’m AJ King, the Director of Threat Research here at SnapAttack. In today’s episode, I dive into detecting the XZ Backdoor, CVE-2024-3094, a sophisticated supply chain attack that could have had a massive impact on many Linux distributions.

Aligning Cyber Strategy with Business Goals: A Crucial Gap

Explore the critical gap in many organizations where cyber strategy fails to align with business goals in this insightful episode from the Razorwire Podcast. Learn why this misalignment poses challenges for CISOs and other cybersecurity professionals who struggle to communicate the importance of security investments to decision-makers. This short delves into the often overlooked connection between a company's risk appetite and its cybersecurity measures, emphasizing the need for a cohesive strategy that supports the core business objectives.

Breaking the Cloud to Build the Cloud

There’s no such thing as a perfectly secure cloud environment. Vulnerabilities, holes left open by misconfigurations, over-permissive roles, and more create a target-rich environment for attackers. Breaking the cloud for good is the job of these expert hackers. View this panel session to learn about offensive security techniques and tactics for breaking the cloud to build the cloud better.

Why Chinese-made IoT devices are growing in the US despite bans

Between 2023 and 2024, Chinese-made IoT devices in US networks grew by over 40%, as reported in our recent Forescout Research — Vedere Labs report. Why have banned Chinese-devices grown over the last year in the US and in other regions? In this video, Elisa Costante, our VP of Research, and Rik Ferguson, our VP of Security Intelligence, explore this question in detail.

Unexpected Connections: The Future of Internet-Connected Spaces

In today's digital age, the concept of connectivity has transcended beyond our wildest imaginations. "Unexpected Connections: The Future of Internet-Connected Spaces" dives deep into the realm where anything and everything can be connected to the internet, including applications not traditionally approved by tech departments. 🏢🌍📲

Revolutionizing access to capital for small businesses - S2E08

In this episode, we're excited to introduce Sri Kaza, the visionary founder of BrightCap, a fintech pioneer transforming the way small businesses access capital. With a career spanning over two decades in business leadership, consulting, and entrepreneurship, Sri brings a wealth of experience and a deep understanding of the financial challenges facing small businesses. Join us as we explore Sri's journey, the mission behind BrightCap, and how they're leveraging technology to democratize access to funding for America's small enterprises.

Webinar: Incorporating Digital Risk Exposure in Your Threat Detection Strategy

Watch as Kroll experts Wojcieszek and Scott Hanson outline the key benefits of incorporating surface, deep and dark web intelligence into your threat detection and response plans. During the session, they discuss the top use cases of digital risk protection and the best approaches to mapping out and reducing your digital risk across all areas of the internet. They also outline how security teams can use this external threat intelligence to improve their threat detection and response efforts and get wider visibility across the attack lifecycle.

Securing the Supply Chain - Automating our Way Out of Security Whack-a-Mole

Open-source components forever changed how we build software, but they are also a prominent security threat, nothing illustrated this better than the recent XZ library incident where the world narrowly avoided a massive supply chain attack. Join Gene Gotimer and Mackenzie Jackson to discuss how we can keep our open-source supply chains secure as we discuss: Security implications of vulnerable open-source components How using automation can help us move toward a secure supply chain How to discover and detect vulnerable components.