Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Strengthen Your Identity Security: CyberArk's Integration with AWS

In today's digital landscape, safeguarding identities is paramount. CyberArk's integration with diverse AWS technologies fortifies your defense against identity-focused threats. This collaboration empowers organizations to bolster their Identity Security strategies, thwart attacks, and ensure seamless, secure user experiences throughout the enterprise. Discover how CyberArk and AWS combine forces to elevate your security measures and protect against evolving cyber risks. Dive into this insightful video to learn more about this powerful partnership and safeguard your digital identities effectively.

Arctic Wolf Always Ahead: 2024 Cybersecurity Predictions

In this episode of Always Ahead, our Chief Product Officer Dan Schiappa explains why the cybersecurity industry should expect ransomware to continue to dominate the threat landscape in 2024, and why organizations that prioritize cyber insurance and AI integration are on the right track to protect their IT environment.

Unleashing the Hidden World of Cybercriminals: The Growing Threat of Cybercrime-as-a-Service

Welcome to Razorwire, the podcast where we cut through the tangled web of cybersecurity to bring you the latest insights and expert analysis. Victor Acin and Oliver Rochford, two esteemed guests, are with me in today's episode. In this episode, we’re exploring the dangerous world of cybercrime as a service and its implications for individuals, organizations, and even nation-states. Join us this week as we unveil the dark side of cybercrime. Victor, the Head of Threat Intelligence at Outpost 24, shares his expertise on the rise of cybercrime as a service. Discover how cybercriminals have adapted their tactics, the motivations driving their actions, and the alarming ease with which they operate. Stay ahead of the game with insider knowledge from Oliver's research, where he discusses the striking similarities between cybercrime services and legitimate tech services. Learn about the techniques used by cybercriminals to infiltrate organizations and exploit their vulnerabilities. Whether you're a seasoned professional or just starting your cybersecurity journey, this episode offers some excellent, practical advice for strengthening your defences. We share some effective ways to protect against credential theft, insider threats, and targeted attacks. Hear about tried and trusted remedies recommended by our experts that can make a significant impact on securing your organization. So, if you're a cybersecurity professional looking to expand your knowledge and sharpen your skills, join us on Razorwire as we unravel the intricate world of cybercrime as a service.

Cyber Crime Surge: Unmasking Employee Collusion and Modular Attack Chains || Razorthorn Security

In the evolving landscape of cyber threats, a seismic shift has occurred over the last couple of years. Join us in unraveling the intricate web of cyber crime as a service, where operators entice employees into collusion by dangling lucrative financial incentives. This phenomenon has contributed to a staggering rise in organized cyber attacks.

How to Operationalize Vulnerability Threat Intelligence

With so many vulnerabilities to address and potential threats looming, how can organizations prioritize and respond effectively? Enter Vulnerability Threat Intelligence (VTI). This knowledge not only aids in pinpointing vulnerabilities but also shapes strategies for risk acceptance and rapid responses to zero-day threats. Join our webinar where Patrick Garrity from Nucleus Security, Caleb Hoch from Google, and Jared Semrau from Mandiant, uncover how to effectively leverage vulnerability threat intelligence (VTI).