Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lockdown Impact: Did Lockdowns Turbocharge the Rise of Cybercrime Services | Razorthorn Security

Unraveling the Cyber Odyssey: Did Lockdowns Propel the Explosive Growth of Cybercrime Services? Join us as we delve into the epic transformation triggered by global lockdowns, shaping the landscape of cybercrime services. Did the lockdowns accelerate the rise of new and sophisticated cyber services? Explore the dynamic forces at play and the undeniable impact on the cyber ecosystem. From ransomware's meteoric surge to the pivotal FBI takedown in 2015 that revealed the lucrative world of cybercrime revenue, we connect the dots to unveil the unfolding narrative.

Unveiling the Secret Realms: Private Intelligence, Mercenaries, and Cyber Intrigues #cybersecurity

Dive into the secret world of growing art! In this video, we explore the expansion of private intelligence and the mercenary sector, questioning whether cyber warfare is now part of their arsenal. Join the discussion as we shine a light on prominent players like NSO and uncover interesting facts. Are these industries integrating with cyber capabilities? We dissect the possibilities and shed light on the shadows of individual actions. From corporate espionage scandals to Uber's infamous software installation in drivers' cars, we uncover different aspects of industrial espionage.

Achievements and Aspirations: Reflecting on 2023 and Predicting 2024

2023 has been a busy year for cybersecurity. From changes in compliance and regulations to the ever-increasing number of attacks, there's a lot to talk about. Join us in reviewing the highs and lows of cybersecurity in 2023 and what we can expect to see as we enter 2024. Hear expert advice and commentating from Chris Clements, Gary Perkins, and Jerald Dawkins, Ph.D. Jerald Dawkins, Ph.D, is the Chief Technology Officer for CISO Global. He currently holds three patents for network gateway messaging systems and methods for tokenization to support pseudonymization of sensitive data and services.

From Cards to Cryptos: Unraveling Cybercrime's Evolution with Robert Rodriguez's Shocking Tale

Embark on a journey into the shadowy realms of cybercrime with the intriguing tale of Robert Rodriguez. Join me as we delve into the underworld of credit card fraud, retail network hacks, and the evolution that reshaped the landscape of cyber criminality.

Hardening Graylog Encryptify Your Log Supply

Graylog Support Engineer Will Trelawny shares invaluable insights into enhancing Graylog security through encryption and authentication using transport layer security (TLS). He provides an in-depth and easy-to-follow walkthrough on setting up Graylog deployment configurations, encrypting communications, authenticating nodes, and securing the OpenSearch backend. The video also includes practical demonstrations on why and how to encrypt logs, authenticate log sources, and secure communication with OpenSearch. This video is an excellent resource for anyone looking to strengthen their Graylog security measures.

The Howler Bonus Episode - Mental Health & Wellbeing Roundtable

In this bonus episode, pack members from around the globe have a conversation about what it looks like for them personally to prioritize mental health and wellbeing. Interested in running with the pack? Explore careers at Arctic Wolf—one of the fastest-growing and exciting cybersecurity companies in the world, to learn about how you can join our Pack, create impact, and influence what’s next in security operations.

Decoding Ransomware's Code of Conduct: Surprising Rules of Engagement & the Robin Hood Twist #crypto

Dive into the intriguing world of cybersecurity as we explore the surprising ethical guidelines followed by ransomware groups in this eye-opening video. It's crazy, but many of these cybercriminals adhere to a set of Rules of Engagement, steering clear of unthinkable targets like children's hospitals. While some still cross the line, a remarkable instance emerged when a ransomware group, upon realizing they had hit a kids' hospital, apologized and handed over the decryptor – a Robin Hood-esque gesture in the digital realm.

GitGuardian - Your code security platform

In an era where digital security is paramount, GitGuardian stands as your ultimate code security solution. Presented by Mackenzie Jackson, a Developer Advocate at GitGuardian, this video unveils the platform's cutting-edge features designed to bolster your software supply chain. GitGuardian is your comprehensive safeguard, exposing and protecting critical assets across your supply chain. From Secrets Detection to Infra as Code Security and the powerful Honeytoken, this platform equips you to proactively secure your code.

Check if your secrets have leaked on GitHub - Has My Secret Leaked Demo

Since 2017 GitGuardian has been monitoring all public activity on GitHub. Now in a new product called Has My Secret Leaked you can check if your secrets on GitHub. In this video, Mackenzie runs through how to use both the web interface and CLI tool GGShield to check if your secrets have ever been exposed on GitHub, regardless of if they have since been deleted. Has My Secret Leaked is a service that will first create a secure hash of your secret locally then match it to other hashes in the GitGuardian database.