Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Protecting Dreams: AmFam Doubles Down on Resilience

AmFam Group is a Fortune 500 company based in Madison, Wisconsin. The mutual insurance company specializes in property, casualty, and auto with 13 million policies enforced, ranging from mom-and-pop shops to global Fortune 100 companies. With a mission to inspire, protect, and restore dreams, to AmFam, data security and cyber resiliency are non-negotiable. They strategically selected Rubrik as their data security partner to remain resilient in the midst of cyber threats.

Trust Talks with Annie O'Rourke, Director of Compliance, Audit and Assurance at Snyk

Sravish sits down with Annie O’Rourke to discuss the latest security and GRC trends. Discover the secrets to making GRC more accessible for your company, sharing impactful metrics with the board, and find out why Annie and the Snyk team love using Awarego!

Coffee Talk with SURGe: 2023-JULY-11 Meta's Threads, US/EU Data Sharing, MOVEit Update, iOS Patch

Grab a cup of coffee and join Mick Baccio, Ryan Kovar and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan competed in a 60 second charity challenge benefitting the Malala Fund to share their suggestions for this year's defense policy bill.

LockBit hits TSMC: A $70M Ransom?

TSMC, the world’s largest semiconductor manufacturer, has been listed on LockBit’s dark web blog, with the gang demanding $70 million for the stolen data. TSMC states that it was due to their IT hardware suppliers; yet another reason to pay attention to the supply chain. So, who are LockBit, how do they operate, and how can you prevent this from happening to you? Learn all this and more on the latest episode of The Ring of Defense!

Reality of Cyber Warfare: What It Means for Our Technological Reliance

As a species, we have become increasingly dependent on technology, a fact that hasn't gone unnoticed by various observers. Infosec experts have long discussed the concept of cyber warfare—its potential appearance, methods of execution, and warning signs to watch out for. However, until now, our understanding of this phenomenon has been limited, as it was largely theoretical. Presently, due to the ongoing global events, we are faced with a stark reality where cyber warfare could potentially manifest on a large scale.

How to Snare Software Supply Chain Hackers with Honeytokens - Mackenzie Jackson at InfoSec London

Learn from Mackenzie Jackson, Developer Advocate at GitGuardian, about the evolving nature of software supply chain attacks and the importance of deploying honeytokens to track and document attackers' movements. Discover how honeytokens can enhance supply chain defenses and uncover vulnerabilities that traditional security tools may miss.