Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Imparting Trust: Paws for Reflection

In this week's episode, Bill and Robin delve once again into the world of Zero Trust as they discuss how end-to-end encrypted messaging services have fallen victim to the BadBazaar trojan, as well as asking the question "Should you trust URLs on your children's snacks?" Learn all this and more on the latest episode of The Ring of Defense!

Manage by Objectives | The New Normal

In today's rapidly evolving business landscape, a significant challenge has emerged for managers—the shift from traditional hands-on management to a more objective-based approach. Join us in this insightful discussion as we explore how managers are navigating this transition, realizing that the days of "managing by walking around" are giving way to a new era of leadership. In this video, we delve into the experiences of managers who've grappled with the realization that physical proximity is no longer the cornerstone of effective leadership. Discover the strategies they're adopting to ensure their teams thrive in this changing environment, where success is measured by outcomes rather than constant oversight. If you're a manager seeking to understand how to remain relevant and impactful in the modern workplace, this video is a must-watch. Embrace the paradigm shift and learn to manage by objectives, fostering a culture of achievement and innovation.

Coffee Talk with SURGe: 2023-SEPT-05 Mudge Joins CISA, Qakbot Takedown, Infamous Chisel Malware

Grab a cup of coffee and join Mick Baccio, Ryan Kovar and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan competed in a 60 second charity challenge to share their favorite hack of all time before a deep dive on extortionware vs. ransomware.

Cybersecurity Should Not Be Under IT Department

We delve into a critical flaw that continues to persist within many organizations—the subservience of cybersecurity teams to their overarching IT counterparts. Join us as we unpack the challenges stemming from this hierarchy and explore the urgent need for a transformative shift. 🔒 Subordination No More: It's disheartening to witness security teams relegated to a subordinate role within IT departments. The pervasive 'can we' versus 'should we' dilemma underscores a bigger issue that hampers our collective progress.

PCI DSS Requirement 4 : Summary of Changes from Version 3.2.1 to 4.0 Explained

In this video, we at VISTA InfoSec provide a detailed summary of the changes made to PCI DSS Requirement 4 from version 3.2.1 to 4.0. Our expert, Narendra Sahoo, explains the key differences and what they mean for your organization’s compliance with the Payment Card Industry Data Security Standard (PCI DSS). As a leading provider of service and consulting services, VISTA InfoSec is committed to helping our clients navigate the complex world of information security and compliance. Watch this video to learn more about the changes to PCI DSS Requirement 4 and how they may affect your business.

SOC Visibility Triad, Why You Need NDR Alongside EDR

Defenders face numerous challenges in their complex, ever-expanding environments. Good data or network truth shouldn't be one of them. As Corelight is the standard in the NDR market, we will explore how to pivot from NDR to several EDR tools. The demo will showcase popular tools and give analyst workflow examples and use cases. Speaker: Steven Swaim (Principal Federal Sales Engineer, Corelight)