Hear from Keeper Security’s Chief Information Security Officer, Shane Barney, for an exclusive, interview-style webinar addressing the most pressing questions around secrets management and Privileged Access Management (PAM) in today’s public sector IT landscape.
Phishing and social engineering — are they the same thing? Not quite! In this video, we break down the key differences, show real-world examples and give you essential tips to protect yourself from both.
In this video, Dwayne McDaniel, Developer Advocate at GitGuardian, walks you through the workflow security and DevOps teams can follow to investigate and remediate a secret leak using the GitGuardian platform. Whether it’s an exposed API key, token, or internal credential, GitGuardian helps you go from alert to resolution with confidence.
Bug bounty programs are more than just rewards for hackers—they’re a gateway to stronger security, global collaboration, and even career transformation. In this episode, Netta Oren, cybersecurity manager and seasoned bug bounty advocate, shares how organizations can build successful bounty programs, responsibly manage disclosures, and create a win-win culture for both companies and ethical hackers.
GPT-5 was jailbroken in under 24 hours using simple "storytelling" techniques that bypass safety guardrails. The key insight from our podcast? Individual AI requests appear legitimate but become dangerous when combined. Bad actors can request network code in one session, convincing emails in another, and credential collection forms in a third. Each task seems normal individually, but together they form a complete phishing toolkit.
We welcomed Ezra Woods, Security Engineer at Grand Canyon Education to Defender Fridays. Ezra discussed remote management tool abuse. He shared insights on current attack trends and practical defensive strategies you can use to protect your environment.
Threat hunters need evidence to find adversaries. Networks offer a broad and reliable source of evidence, helping hunters make sense of movement across their environment via an immutable record of activity. Traffic, unlike endpoints, cannot lie. But the rise of encryption complicates this picture, especially where decryption isn't an optimal or possible solution.
A critical zero-day (CVSS 10.0) in Adobe Experience Manager (AEM) Forms JEE 6.5.23.0 and earlier allows authentication bypass and remote code execution (RCE). AppTrana delivers immediate Day 0 protection with: Virtual patching before vendor fixes Continuous monitoring of exploit attempts 24×7 security team ensuring zero downtime With a public PoC already available, the risk is high. Apply the patch ASAP or protect instantly with AppTrana WAAP.