Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OWASP Top 10 | A07: 2021 - Identification & Authentication Failures

Identification and authentication policies are very important in safeguarding digital assets, protecting privacy, ensuring regulatory compliance, fostering trust, and mitigating risks in today's interconnected and data-driven environments. But some organizations are lax in implementing these policies creating security risks for them and the data of the people stored there. Today we will learn about the various ways in which cybercriminals steal dat and how organizations can prevent it.

User Training vs. Security Controls: Who's to Blame for Phishing Attacks?

In this thought-provoking clip, the hosts debate whether security awareness training is enough to prevent users from falling for phishing scams or if stronger controls are necessary. Drawing on insights from a recent NCSC blog, they explore the ethical dilemma of assigning blame when users, despite training, click on malicious email attachments. Should the onus be on the end user, or is it a failure of security controls? Tune in to understand the complexities of balancing trust and control in cybersecurity.

Episode 4: Enhance your PEDM strategy with PAM360's advanced privilege elevation controls

In the fourth episode, we will uncover all the granular privilege elevation controls offered by PAM360, including real-time risk assessment, application and command controls, and end-to-end management of endpoint privileges. Join us to explore PAM360's advanced privilege elevation controls—complete with customizable options—and learn how to maximize their effectiveness for your needs. By the end of this episode, you will have a complete understanding of.

Dani Grant (Jam.dev) | Fixing Bugs, Building a Company, and the Future of the Web

Dani Grant, co-founder of Jam.dev, talks about her company, how they are trying to fix the bug process for developers, and also discusses how Jam.dev uses Cloudflare. We also go over what a better internet for the future looks like, and the challenges and opportunities in the AI era.

Trust vs Control - Is Zero Trust Inevitable?

Welcome back to Razorwire, the podcast slicing through the tangled world of cybersecurity! I'm your host, Jim and in this episode we’re talking about the crucial balance between trusting your workforce and exerting control over your security ecosystem. Joining me are Iain Pye, sharing his insights into privacy roles, and David Higgins from CyberArk, who will discuss the challenges and strategies of effective cybersecurity. Whether you're managing remote teams or integrating third party services, this episode is packed with expert analysis and actionable advice.

Why Trust Alone Isn't Enough in Cybersecurity: The Need for Control

In this insightful clip, our host delves into the common misconception that trust in suppliers and staff is sufficient for cybersecurity. Highlighting the adage 'trust is good, but control is better,' the discussion emphasises the necessity of implementing robust controls to detect and manage breaches of trust. Learn why regular assessments and monitoring are critical to safeguarding your organisation from potential failures in this must-watch segment.

Powerful Detection Response Capabilities w/ Bi-directionality

It can be a struggle to keep up with today’s threat landscape. Oftentimes, SOCs are buried in a mountain of honed detections, but still follow manual response playbooks and analyst actions. While the best detections can lower Mean Time to Detection (MTTD), slow responses do little to bring down Mean Time to Remediate (MTTR). Let’s change that.