Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing GitGuardian Honeytoken

We are proud to introduce you to the GitGuardian Honeytoken module. Honeytokens are decoy credentials that don't allow any real access but instead trigger alerts that reveal the IP address of whoever tried to use them. GitGuardian honeytokens can be used for intrusion detection in your own environments and tools. You can also plant our honeytokens in your SaaS vendors' systems to be alerted if a core vendor in the supply chain has been compromised. Placing honeytokens in your source code help you detect when your code has been leaked publicly, indicating a code leak.

Tanium XEM adds a new Digital Employee Experience (DEX) solution area to the platform

At the Tanium Converge World Tour in London, Tanium announced its new Digital Employee Experience (DEX) solution area. In this video Gabe Knuth, Senior Analyst at the Enterprise Strategy Group (ESG) and Stephanie Aceves Tanium’s Senior Director of Product Management talk about the DEX market and what to expect in the Tanium’s new DEX solution area.

How Social Engineers Collect Data to Build an Attack

Social engineers may not appear to be sophisticated, but they often methodically research and collect data on their targets. Don't fall for their tricks. In this video, learn how social engineers gather information, how they can impersonate you, and tips for how to stay safe from their tactics. Learn more about how to engage and prepare employees to recognize and neutralize social engineering attacks with Arctic Wolf's Managed Security Awareness.

Coffee Talk with SURGe: 2023-APR-18 NSO Group, LockBit macOS Encryptors, AI in CTI, MSFT Taxonomy

Grab a cup of coffee and join Ryan Kovar, Mick Baccio, and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan competed in a 60 second charity challenge about how generative artificial intelligence could be used in cyber threat intelligence, with proceeds benefiting the ACLU. The trio also discussed Microsoft's new threat actor naming taxonomy and the role of attribution in cyber threat intelligence.

What is Firewall as a Service? #FWaaS Explained | Cato Networks

In this video, Bill answers the questions 'What is a #firewall?' and 'What is a Firewall as a Service (FWaaS)?'. He explains the benefits of #fwaas , provides scenarios where FWaaS can be particularly useful, and highlights some key features to look for in a FWaaS provider.

Random but Memorable - Episode 10.6: Show Smart Passkey Support

Is this really the 'death of passwords'? ��🔤 Steve Won, Chief Product Officer at 1Password, jumps into the deep end on today's show. Tune in, as we cover all things passwordless, passkeys, and how 1Password is leading the way to a passwordless future. We also lift the lid on all the latest security news in Watchtower Weekly, and reveal the iconic Random but Memorable game you voted to bring back in our listener poll! 🥁🗳️

Detecting and mitigating ransomware using Endpoint Central.

Is your organization at risk of a ransomware attack? Don't wait until it's too late. With Endpoint Central's advanced anti-ransomware solution, you can detect and block intrusions in real-time, using our multi-patented technology and AI-assisted detection engine. Keep your data safe and prevent costly ransom payments with Endpoint Central's 24/7 threat detection and rapid response capabilities.