Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Securing the Digital Supply Chain Ep 8 - Terence Jackson CISO, SLG, Microsoft

In this episode of Securing the Digital Supply Chain we talk with terence Jackson, CISO at Microsoft for State and Local Government customers! We have a great time talking about the trends in the Software Supply Chain area as well what can CISOs focus on to get quick wins for their organizations. Terence brings a wealth of experience from small to medium scale to large enterprise organizations and applies them to various security challenges to effectively solve them.

Vulnerable AWS Lambda function - Initial access in cloud attacks - Blog Article

Serverless is becoming mainstream in business applications to achieve scalability, performance, and cost efficiency without managing the underlying infrastructure. Our security research team will explain a real attack scenario from the black box and white box perspective on how a vulnerable AWS Lambda function could be used by attackers as initial access into your cloud environment. Finally, we show the best practices to mitigate this vector of attack.

This Month in Datadog: February 2022 (Episode 8)

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. To learn more about Datadog and start a free 14-day trial, visit Cloud Monitoring as a Service. This month we put the Spotlight on Datadog Application Security which is now in public beta.

Thinking Like a Threat Actor: Hunting the Ghost in the Machine

An advanced adversary has bypassed the perimeter defenses, moved inside the environment, and become a literal ghost in the machine, free to move from system to system.... searching for its next target. This is a scenario that every SOC fears, and it presents a daunting threat hunting challenge. But, as we will demonstrate, it doesn't have to.

Webinar: Box, urlscan, Tines: URL analysis & phishing automation

In this webinar, Tines co-founder Thomas Kinsella sits down with Del from Box, and Johannes from urlscan, to take a look at some key use cases running production – URL analysis and phishing. As well as walking through how Box has designed these processes in Tines, we also discuss reflect on what security teams, engineers, analysts, and threat hunters can learn from Box’s approach more generally.