Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Signing Kubernetes with Sigstore

Adolfo García Veytia, Staff Software Engineer at ChainGuard and Tech Lead on the Kubernetes SIG-Release team, joins Eric and Kyle to talk about how they were able to tackle signing all of the Kubernetes v1.24 image artifacts using Sigstore. Then we will demonstrate signing an image and vulnerability scan result attestations with Sigstore's cosign utility.

Feroot Security | Inspector Product Demo

Feroot Security Inspector automatically discovers and reports on all JavaScript web assets and their data access. Inspector finds JavaScript security vulnerabilities on the client-side and reports on them, and provides specific client-side threat remediation advice to security teams in real-time. With Inspector, customers are able to conduct constant client-side attack surface management and defense.

CISOs Need to Speak the Language of Board Members

"I understand the pitfalls of cyber security, but my boss just won't support me with the budget I need.” Does this sound familiar to you as a CISO? I have 3 pieces of advice for you: Speak their language I like to say that CISOs are from Mars, while CEOs and board members are from Venus. It’s because they don't speak the same language. You might go to your board and say, “I installed Akamai Prolexic.1.4.4.3.1./24 subnet to mitigate an SYN flood attack.”

Coffee Talk with SURGe: Signal Numbers Exposed, FTC Data Privacy Rules, Conti Ransomware, E2EE

Grab a cup of coffee and join Ryan Kovar, Mick Baccio, and Audra Streetman for another episode of Coffee Talk with SURGe. This week they discussed Signal's response to the Twilio breach, the FTC's effort to create new data privacy rules, and a $10 million reward for information about a suspected Conti ransomware operator.

Machine Learning, AI & Cyber Security Part 1: Used for Good

Welcome to another episode of Razorwire Podcast! We are joined today by Oliver Rochford of Securonix and Jonathan Care, a mentor of mine who specialises in cyber security and fraud detection. As AI and its application in cyber security are such a big topic, this podcast will be in two parts. We will discuss machine learning and artificial intelligence for information security in the first part of our discussion today.

Changing Your Passwords

Long, randomly generated passwords that are created for each of your logins helps to protect your accounts from cybertheft and account takeover. Keeper’s Password Generator can create and securely store a strong, unique password for each of your sites and apps with the click of the dice. Be sure to refer to a website’s password requirements when creating a new password. You can adjust a password's characters to meet a site’s unique requirements by dragging the slide bar left and right and utilizing the character type check boxes.