Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cybersecurity Burnout and Organisational Culture with Yanya Viskovich & Eve Parmiter

Dive into today's Razorwire episode where we explore the critical issue of burnout in the cybersecurity field. Join Yanya Viskovich, a cyber resilience expert, and Eve Parmiter, a clinical traumatologist, as they provide invaluable insights into combating burnout among cyber defenders. In this episode.

Understanding AI Package Hallucination: The latest dependency security threat

In this video, we explore AI package Hallucination. This threat is a result of AI generation tools hallucinating open-source packages or libraries that don't exist. In this video, we explore why this happens and show a demo of ChatGPT creating multiple packages that don't exist. We also explain why this is a prominent threat and how malicious hackers could harness this new vulnerability for evil. It is the next evolution of Typo Squatting.

The NFL's George Griesler on securing the Super Bowl and reducing risk through collaboration

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by George Griesler. George has been working in cybersecurity since 1997, when he assumed the role of Senior Network administrator at the United States Golf Association (USGA), eventually advancing to Director of Information Security. He currently serves as the Senior Director of Cybersecurity at the National Football League (NFL), where he works to secure events like the Super Bowl, which in 2024 was the most-watched telecast ever.

Revolutionizing Security: How Brivo Leads with Cutting-Edge Tech

Dive into the world of advanced security technology with Brivo, the pioneer in cloud-based access control and smart spaces technology. For over two decades, Brivo has been at the forefront of innovation, partnering with top providers and internal security teams to equip customers with the latest advancements. 🌐✨

BDRSuite Overview - Data Backup and Recovery solution

BDRSuite is a comprehensive and most cost-effective Backup and Disaster Recovery Software designed to protect Virtual Machines (VMware, Hyper-V, KVM, oVirt, Proxmox), Servers (Windows, Linux, NAS), Endpoint (Windows, Linux, Mac), SaaS Applications (Microsoft 365, Google Workspace), Cloud Workloads (AWS, Azure), and Applications & Databases (Microsoft Exchange Server, SQL Server, SharePoint, MySQL, PostgreSQL)

How to Recover a Full VMware vSphere VM From a Backup

NAKIVO Backup & Replication proporciona múltiples opciones de recuperación para máquinas virtuales VMware vSphere, permitiendo una rápida restauración de las operaciones normales de negocio en caso de interrupciones o pérdida de datos. Siga los pasos de este vídeo para aprender a recuperar completamente una máquina virtual VMware vSphere a partir de un backup existente utilizando NAKIVO Backup & Replication.

How to choose the Best Node.js Docker Image

Today we walk through the best options for your Node.js Docker Image, how to avoid common pitfalls and mistakes, and the best ways to strengthen the security of your projects effectively. ⏲️ Chapters ⏲️ ⚒️ About Snyk ⚒️ Snyk helps you find and fix vulnerabilities in your code, open-source dependencies, containers, infrastructure-as-code, software pipelines, IDEs, and more! Move fast, stay secure.

Unlocking the Future: Facial Recognition & Biometrics

Dive into the world of Facial Recognition and Biometrics with us! 🌐✨ This video explores the cutting-edge technology of facial recognition and its integration with biometric data for seamless, contactless access. ✨🔐 From enhancing security to ensuring privacy, discover how artificial intelligence is revolutionizing the way we interact with technology. But it's not all about convenience; we also delve into the critical aspects of privacy and security considerations. 🔒💡

Top 5 Myths About API Security and What To Do Instead

Discover the top five myths about API security and learn the effective strategies for protecting your digital assets. Understand why attacks are common, the limitations of perimeter security, and the importance of a zero trust model in this comprehensive overview. Uncover the realities of API security, from the prevalence of attacks to the challenges of relying on perimeter defenses. Learn why a zero trust approach and better developer engagement are key to robust API protection.