Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Offensive Security | Cybersecurity Sessions #6 with Jonathan Echavarria

How can you really know what havoc hackers could wreak on your systems? By challenging them to do it and fixing the exploits they discover, of course. In this episode of the Cybersecurity Sessions, Andy finds out what it’s like to be on a ‘red team’ tasked with hacking into an employer’s own systems by any means necessary, with lauded offensive security practitioner Jonathan Echavarria (ReliaQuest).

Coffee Talk with SURGe: 2022-APR-05 State Department, Elections, Spring4Shell, Certs/Lapsus$, RSA!

Grab a cup of coffee and join Ryan Kovar, Mick Baccio, and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news and compete in a 60 second charity challenge. You don't want to miss it!

Spotlight on Technology - Secure Content Collaboration

Razorthorn MD James Rees is joined by Andy Johnson from HighSide - experts in controlled file sharing and secure collaboration - for a discussion on what can be done to improve data security for businesses operating in security-conscious and regulated industries. Working remotely requires online collaboration with colleagues and external organisations, but when you send a file or speak via an online chat platform, you're opening up safety risks due to a lack of adequate security and encryption.

Ransomware Attacks: How to Mitigate Risk and Protect Your Data

Ransomware is not a new threat, but the tactics that attackers are using to access corporate infrastructures and steal resources has evolved. With the continuation of remote work and data being stored on the cloud, attackers only need to compromise one user, app or device to gain access.

Managing GDPR Vendor Third Party Risk Management Across Supply Chain

Vendor Third-Party Risk Management is a major concern for organizations looking to achieve GDPR Compliance. EU GDPR is a stringent Data Privacy law that organizations are expected to comply with. So, even organizations outsourcing major parts of their data processing operations to third-party vendors need to ensure that their vendors are compliant.