Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Decoding Cybersecurity: Pipelines vs. Power Grid | Unveiling the Unique Challenges in Legislation

Dive into the fascinating realm of cybersecurity with our latest exploration, as we dissect the historical focus on electricity grids versus the unique challenges posed by pipelines. Traditionally, issues on the electricity grid have captured immediate attention, often portrayed in Hollywood hacking scenes with dramatic attempts to switch off lights. However, the landscape shifts when it comes to pipelines.

Defending Against Modern Breaches: Lookout's Defense-in-Depth Solution

Today, cloud breaches happen in minutes. Not months. Attackers, with just the right login, can instantly access your data. To halt a breach, identifying and blocking data theft is essential. Prevention, however, begins with securing mobile devices. which are often unprotected, are highly susceptible to social engineering. Lookout adds depth to your defense with security that works at every turn. This includes blocking text messages that steal credentials and preventing compromised accounts from accessing your data. With Lookout, rest assured that your cloud data flows freely, and securely.

Securing Your Cloud Infrastructure with Azure & Tines

In the third instalment of "Tines, securing your cloud infrastructure" we look at two stories designed to save money and resources and close potential security gaps in your Azure environment. Firstly, we'll address the task of 'Updating groups assigned to a user in Azure Active Directory' which allows admins to update a user's group membership in Azure Active Directory. This is essential for adding extra security to accounts flagged for suspicious activity and protecting the team & company as a whole.

Random but Memorable - Episode 12.1: Data Breach Box Set with Jayson E Street

We're back! Join the podcast crew for a brand new season of random security. We're kicking off our first episode with notorious hacker and expert security consultant, Jayson E. Street. Settle in, as he recalls how understanding human behavior led him to successfully robbing banks and organizations on five different continents.

Cloud Unfiltered with Ayse Kaya - Container Security Report - Episode 1

Join host Michael Chenetz and returning guest Ayse Kaya as they delve into the critical topic of container security. This episode covers the latest insights from the 2023 SlimAI Container Report, focusing on the challenges and advancements in this ever-evolving field.

Striking the Right Balance: Compliance vs. Real Cyber Risks | Navigating Organizational Priorities

In our latest exploration of cybersecurity challenges, we delve into the delicate balance organizations must strike between compliance efforts and the real cyber risks they face from the outside world. It's a common pitfall for organizations to develop a higher tolerance for compliance risks, often channeling significant resources and funds into demonstrating adherence rather than actively managing and mitigating specific threats.