Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Firstup extends security organizational wide with Datadog and AWS

n this video, learn how Datadog’s integrated solutions can increase visibility and improve collaboration between DevOps and security teams in real time. In this session, you will learn how Chad Upton, Vice President of Infrastructure at Firstup, uses Datadog Cloud Security Management to bring together cloud security and observability to enable their engineers to continuously maintain security and compliance best practices across their AWS assets. You’ll also get the chance to hear from Ray Zaman, Solutions Architect at AWS, on how to easily surface and remediate misconfigurations of your AWS environment with Cloud Security Management.

How to Prepare for Critical Infrastructure Security Threats

As part of our 2-Minute Security Talks series, Bob Thompson, Associate Managing Director in Kroll’s Security Risk Management practice for EMEA and APAC, addresses the threats to critical national infrastructure that are emerging from global geopolitical instability. Bob also discusses how Kroll can support organizations with threat monitoring, security reviews, risk assessments, cyber resilience assessments and crisis preparedness, and reviews the seven key points of Kroll’s risk assessment process that can help companies mitigate threats.

The Behavioral Science of Cybersecurity | Cybersecurity Sessions #14 with Si Pavitt & Steve Dewsnip

If a stranger walked into your workplace and asked you your name and email address, would you co-operate? What if they asked you to open a door for them, or to use your laptop or phone, all whilst wearing a shirt that said “CHALLENGE ME” on it?

Unlock Any CLI Using Your Fingerprint With 1Password Shell Plugins

With 1Password Shell Plugins, you can forget about storing insecure plaintext keys on disk or manually typing credentials or MFA codes into your terminal. Instead, sign on to any CLI with your fingerprint. Install & configure the relevant plugins for your toolchain via the 1Password CLI and you’re all set. You can even build and contribute your own plugins as needed via the open-source community project.

The Cyber Security Skills Shortage

Whether you are training to become an information security professional or if you are more seasoned in the cyber security industry, this is an episode you don’t want to miss. In this episode, I am joined by Josh Davies and Keith Christie-Smith to talk about what the cyber security skills shortage means for the industry and how we can address this.