Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Escaping a Docker container

Escaping a docker container can get you access to the whole linux host, so it's a precious technique for a cyber attack. But it's also valuable for defenders: hacking docker containers to get a breakout is a fun way to better understand a vulnerability and how to better protect from these exploits! In this hands on video, we look at three real life scenarios where you can actually break out from a docker container.

How Skewed Analytics Leads to Bad Marketing | Cybersecurity Sessions #13 with Matt Wilkinson

In a recent Netacea report, 60% of businesses reported a minor financial impact caused by bots skewing their analytics, and with the busiest eCommerce period of the year fast approaching, businesses need to fight back. How do bots affect businesses’ data, marketing campaigns and paid media planning? Host and Principal Security Researcher Cyril Noel-Tagoe is joined by Spike’s Head of Paid Media Matt Wilkinson to discuss the effect bots will have on marketing analytics this Black Friday and how to keep your enterprise’s analytics safe from automated threats during periods of peak traffic.

Key Cybersecurity Trends in 2023

Here are 3 key insights for 2023 I’ve gained after talking to dozens of CISOs and CIOs: Their budgets are not decreasing. Even though we see volatile and turbulent market conditions ahead, most CISOs’ budgets are not decreasing. It’s good news that the industry continues to thrive despite the economic headwinds. They are focusing on public and private sector collaborations. Many governments are amping up their security investments in light of the Ukraine conflict.

Cyber Insurance: Is It Fit For Purpose? | Razorwire Podcast

Most businesses will have a plethora of insurances - employer liability, public liability and indemnity, for example - but what about cyber insurance? It is a relatively new area of insurance, although the risk has existed almost since we started using computers and mobile devices. According to the UK Government Cyber Security Breaches report, 39% of UK businesses have identified at least one cyber attack in the past 12 months, making cyber insurance more crucial than ever.

How to Modernize Access Control for Cloud Applications with Or Weis

Building Modern Access Control for Cloud Applications Join us in this livestream with Permit.io CEO Or Weis as we cover what it means to build modern access controls for cloud applications. Many companies these days find themselves having to reimplement access-controls over and over; therefore, in this episode we discuss solutions, the 5 best practices and open-source tools that can be used. Didn't catch the live stream? Ask all of your Snyk questions and we’ll do our very best to answer them in the comment section.

Introduction to Snyk's revamped reporting

A short overview of Snyk's new and revamped reporting capabilities, providing the visibility needed to hold data-based conversations between development and security. Key new capabilities include the addition of Snyk Code data, improved user experience and performance, new filtering and data sorting, and new sharing options. Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.