Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Navigating Cybersecurity Compliance: The Need for GRC Tools and Strategic Oversight #podcast

Delve into the complex world of cybersecurity compliance with our latest video, where we address the crucial question: How do you effectively track and manage diverse compliance requirements across the board? In an era where adhering to one set of regulations might not align with another, the need for a comprehensive GRC (Governance, Risk, and Compliance) tool becomes paramount.

Vulnerability A03 : Injection - OWASP TOP 10

Welcome to our latest video on the OWASP Top 10, focusing on Vulnerability A03: Injection. This video is designed to provide a comprehensive understanding of injection vulnerabilities, which are among the most common and dangerous security risks in web applications. In this video, we will explore the concept of injection vulnerabilities, their various types, and how they can be identified. We will also look at real-world examples to illustrate the potential impacts of these vulnerabilities when they are exploited.

#100 - A tale of two breaches: examining the AnyDesk & Cloudflare incidents

In this episode of The Cybersecurity Defenders Podcast, we take a close look at the AnyDesk and Cloudflare breaches that were both disclosed on February 2, 2024. AnyDesk, a prominent remote desktop software provider, disclosed a cyberattack late on February 2nd, causing the company to enforce strict security measures for nearly a week. Adversaries breached AnyDesk's systems, compromising vital assets such as source code and private code signing keys, and gaining unauthorized access to production systems.

Cybersecurity Dilemma: Balancing Government Involvement Without Sacrificing Security Budgets

Unravel the cybersecurity dilemma in our latest video, where we explore the complex relationship between government involvement and corporate cybersecurity programs. Many cybersecurity leaders may express reluctance when asked about government intervention, fearing the additional burdens of setting up new compliance wings and diverting resources from tangible security budgets.

Legislative Challenges: Navigating Knee-Jerk Reactions in Cybersecurity || Razorthorn Security

Explore the pitfalls of knee-jerk legislative reactions in the ever-evolving landscape of cybersecurity in our latest video. Delve into the challenges faced by organizations as they grapple with sudden directives that often emerge as a response to unforeseen events. The knee-jerk nature of some legislation raises crucial questions about the consultation process, leaving cybersecurity professionals wondering if insights from the infosec world were considered.

Customer Corner: How Apree Health Gained Container Visibility and Achieved Compliance

Join David Quisenberry, Senior Manager of Information Security, and Cat Schwan, Security Team Lead, to learn how Sysdig’s powerful runtime insights empower Apree Health to identify, visualize, and eliminate Kubernetes vulnerabilities, threats, and misconfigurations in real time, and how automated evidence gathering and reporting helped them achieve both SOC 2 and HITRUST compliance. Interested in learning more about Sysdig Secure?

Untangling Scattered Spider's Web: Hunting for RMM Tools | Threat SnapShot

Remote Monitoring and Management (RMM) tools, traditionally utilized by IT departments to oversee and manage network infrastructure, software, and systems remotely, have increasingly become a double-edged sword in cybersecurity. The recent breach of AnyDesk, a popular RMM software, underscores the criticality of securing these tools against exploitation. Adversaries like Scattered Spider exploit these legitimate tools for malicious purposes, leveraging them to gain unauthorized access, maintain persistence, and conduct lateral movement within targeted networks.

BrowseControl Web Filtering Software Overview | CurrentWare v9.0.1

Don’t let internet abuse run rampant in your organization. Take back control over web browsing with a free trial of BrowseControl. BrowseControl is an easy-to-use web content filtering software that helps organizations enforce policies, improve productivity, reduce bandwidth consumption, and meet compliance requirements - no matter where their users are located.