Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why We Should Probably Stop Visually Verifying Checksums

Hello there! Thanks for stopping by. Let me get straight into it and start things off with what a checksum is to be inclusive of all audiences here, from Wikipedia : “A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity.”

Twilio's Prima Virani on democratizing security and tackling burnout through automation

In this episode of The Future of Security Operations podcast, I'm joined by Prima Virani. Prima is a security engineer who worked across industries as varied as oil and gas and Fintech before becoming Principal Security Engineer at Twilio. With over a decade of experience spanning infrastructure security engineering, incident detection and response, and forensics, she's also shared insights at countless security conferences around the world, including SecTOR Canada and Agile India.

"The best inspiration comes from other builders": inside the Security Automation Roadshow

Last month, we hosted our inaugural Security Automation Roadshow in San Francisco, bringing our brilliant community of builders together for knowledge sharing, interactive learning, and, of course, workflow building. Speaking at the event, our co-founder and CEO Eoin Hinchy shared the inspiration for the series. Earlier in his career, he saw how important community and peer-to-peer networking can be for both organizations and individual professional development.

Unveiling the Latest Ransomware Threats Targeting the Casino and Entertainment Industry

Anyone who has visited a casino knows these organizations go to a great deal of expense and physical effort to ensure their patrons do not cheat. Still, there is a large group of actors who are uninterested in card counting or using loaded dice at the craps table. In fact, these adversaries don't bother going into the building or even visiting the country where the casino is located. Cyber threat groups.

Economic Panic: Exploring the Dual Nature of Employment in the Age of AI | Razorthorn Security

Delve into the current economic landscape of the West with us as we explore the phenomenon of job redundancy and the rise of dual employment. Despite some attributing layoffs to AI, the reality may be a broader downturn in the economy. Join the discussion as we uncover the motivations behind individuals opting for multiple jobs, driven by the desire for higher earnings and the perception of overworking. Discover how programmers, in particular, navigate dual roles, potentially working for both legitimate companies and malware operators, exploiting the system for financial gain.

How To Manage SSH Keys

Secrets are non-human privileged credentials used by systems and applications to access services and IT resources containing highly sensitive information. One of the most common types of secrets organizations use is called an SSH key. Although SSH keys are secure from certain cyber attacks, they can be compromised due to secret sprawl and mismanagement.

Breaches Beyond Borders: The global landscape of third-party risk

While the digital landscape evolves, cyber adversaries are also honing their tactics, techniques, and procedures. In recent years, ransomware groups have made major disruptions to the digital supply chain and, by extension, the world economy. What’s more, organizations in all industries and geographies continue to grapple with third-party threats, zero-day vulnerabilities, and more.