Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Building Modern Access-Control for Cloud Applications with Or Weis | SnykLIVE Recording

With the growing complexity of modern applications and microservices based architectures getting access-control right has become a huge ongoing pain-point, as companies find themselves reimplementing access-control over and over. Solutions are found in the new tool sets of policy as code, as well as the 5 best practices and open-source tools (e.g. OPA, OPAL, Zanzibar) we can use to face the challenge.

The 443 Podcast Episode 207 - The Twitter Thing

This week on the podcast, we cover the big whistleblower complaint against Twitter including our hot takes on who to believe. We then cover an FBI alert on evasion techniques cyber criminals are deploying in their authentication attacks before finishing with a highlight of a very convincing phish. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

UpGuard Reporting Improvements Demo // Chris Schubert, Senior Product Manager

Hear from UpGuard's Senior Product Manager, Chris Schubert, as he introduces you to UpGuard's new Reporting Improvements Our new reports library which centralizes a variety of frequently used reports for you to explore and generate. Some updates we’ve made to both BreachSight and Vendor Risk reports; making it easier for you to generate either executive level summary reports or detailed reporting.

UpGuard Vendor Risk Matrix Demo // Annie Luu, Product Marketing Manager

Hear from UpGuard's Product Marketing Manager, Annie Luu, as she introduces you to UpGuard's new Vendor Risk Matrix. The new vendor risk matrix, that measures vendor security ratings by business impact, has been added to the Vendor Risk Executive Summary. This feature will help drive action where it matters most, highlighting your vendors of most concern in the top right of the matrix.It’s now easier to quickly focus on the most impactful areas of your third party risk management program, by visualizing your vendor portfolio risk by Security Rating and Tier.

How to Benchmark Your Threat Hunting Readiness and Prepare for the Next Step

Many organizations want to start threat hunting but struggle with knowing where to begin, how to measure success, and how to scale an effective program. This presentation draws on the experience of elite hunters and teams around the world and will discuss an actionable threat hunting maturity model and help you prepare for each step of the journey with specific guidance, concrete examples, and sample threat hunts.

Network Forensics & Incident Response with Open Source Tools

Open source security technologies such as Zeek, Suricata, and Elastic can deliver powerful network detection and response capabilities, and the global communities behind these tools can also serve as a force multiplier for security teams, such as accelerating their response times to zero-day exploits via community-driven detection engineering and intel sharing. This presentation will review popular open source technologies used in network DFIR and cover use cases, integrations, and open source design patterns.