Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Datadog Cloud Security Management: Unified Security and Observability

Datadog Cloud Security Management operates across your stack, bringing together security and observability to create an all-in-one solution that equips teams with a shared view of issues so they’re better able to collaboratively secure their environments.

Scattered Spiders and Black Cats: MGM and Caesars Hacked?

In this week's episode, Bill and Robin dive deep into the techniques and tricks used by the masterminds behind the recent attacks on MGM and the Caesars Entertainment group, Scattered Spider and ALPHV. Why was MGMs business down for 10 days? Why did Caesars pay an alleged $15M ransom? What is BlackCat? How can this have been prevented, and how would this map to something like the MITRE ATT&CK framework?

Cognitive Fitness: Cybersecurity Perspective on Complex VUCA Environments

Cybersecurity is a dynamic, ever-evolving space where traditional approaches often fall short. To thrive in this environment, one must cultivate the ability to think differently and harness cognitive skills to a higher degree than in many other fields. Bec McKeown emphasizes cognitive fitness through the lens of the cybersecurity realm's complex VUCA (Volatility, Uncertainty, Complexity, Ambiguity) environment.

Coffee Talk with SURGe: 2023-OCT-03 WS_FTP RCE, Exim Scope, ChatGPT, Cybersecurity Awareness Month

Grab a cup of coffee and join Mick Baccio, Ryan Kovar and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan competed in a 60 second charity challenge to share the pros and cons of Cybersecurity Awareness Month.

Shira Rubinoff at Blackhat with Israel Mazin, CEO and Chairman of Memcyco

Amidst the electric atmosphere of the Black Hat conference, where cybersecurity luminaries converge to explore cutting-edge innovations, a spotlight shone on Memcyco's CEO, Israel Mazin. In a recent interview captured on film, Israel Mazin engaged in a dialogue with tech influencer and member of our advisory board, Shira Rubinoff. Together, they delved deep into Memcyco's paradigm-shifting product solutions that are challenging the status quo of the threat intelligence landscape.

Automatic Application Protection using Red Hat Advanced Cluster Management with Trilio

See how easy it is to protect a newly deployed application into OpenShift using Red Hat Ansible Automation Platform, followed by an ACM Policy written for Trilio that will auto protect the deployed application (create a backup, according to the policy)