Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Protecto SecRAG - Launch Secure AI Assistants/Chatbots in Minutes

Introducing Protecto's SecRAG, the game-changer for secure AI. SecRAG stands for Secure Retrieval Augmented Generation, a turnkey solution. No need to build complex rag or access controls from scratch. Protecto provides a simple interface and APIs to connect data sources, assign roles, and authorize the data. In a few minutes, your secure AI assistant will be ready. When users ask your Protecto-powered AI assistants, Protecto applies appropriate access control to find the right data and generate responses that don't expose other sensitive information that the user is not authorized to see.

Cloud Unfiltered with Chris Aniszczyk - History of CNCF, Linux FDN, KubeCon & the Future - Episode 3

In this episode, Chris Aniszczyk, CTO of Linux Foundation/CNCF sits down with host, Michael Chenetz to discuss the history of the CNCF (Cloud Native Compute Foundation) and where it is going. Additionally, Chris discusses what he expects the trends to be for the next KubeCon in Paris.

Unraveling the Third-Party Supplier Web: Managing Generational Complexity || Razorthorn Security

In this video, we dive into the intricate layers of third-party supplier networks, transcending the immediate concerns of dealing with organizations to confront the complexities of second, third, and even fourth generations of suppliers. Join us as we navigate through the evolving landscape of supplier relationships and explore strategies for managing the labyrinthine "mishmash" of third-party involvement.

A04 2021 Insecure Design | OWASP TOP 10

Welcome to our ongoing series on the OWASP Top 10, focusing on A04:2021 - Insecure Design. In this episode, we delve into the world of insecure design, a critical aspect of application security. You’ll learn what constitutes an insecure design and how attackers can exploit these weaknesses. We’ll walk you through real-world examples of insecure design, helping you understand its impact and the potential risks involved.