Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Investigations In 5 Minutes With Sysdig

Cloud attacks only take ten minutes, leaving a fraction of that time to investigate and initiate a response. Adversaries already have a head start. Cloud has changed the game and attacks are faster than ever. So to stand a chance, you need to move at cloud speed. Sysdig redefines Cloud Detection and Response by enabling five-minute investigations for even the most complex attacks - empowering our customers with rapid insights and comprehensive visibility across their cloud estates.

LastPass's Christofer Hoff on navigating major incidents while building a security org from scratch

The Future of Security Operations podcast is back for a sixth season, and, to kick it off, Thomas is joined by Christofer Hoff. Christofer has over 30 years of experience in network and information security architecture, development, engineering, operations, and management, including security leadership roles at Bank of America, Citadel, and Juniper Networks. He’s currently Chief Secure Technology Officer at LastPass, a unique role that combines the duties of CSO and CTO, while also serving on the board at FIDO Alliance.

What are Zero-Day Attacks?

A Zero-Day Attack occurs when hackers exploit a previously unknown vulnerability in software or hardware before the developer has a chance to fix it. These attacks are particularly dangerous because there is no defense in place when they occur. In this video, we explain how Zero-Day attacks work and how you can protect your systems from these hidden threats.

Azure Functions Integration: Secure Your Serverless APIs with Astra

Azure Functions provide a scalable and event-driven way to build serverless APIs, but securing them requires continuous monitoring and threat detection. By integrating Astra’s API Security Platform with Azure Functions, you can proactively identify vulnerabilities, monitor API traffic, and protect your serverless applications from real-world attacks.

NGINX Integration: Protect Your API Gateway with Astra

NGINX is a widely used API gateway that efficiently manages API requests, but securing API traffic requires continuous monitoring. By integrating Astra’s API Security Platform with NGINX, you can enhance security by analyzing API requests in real time and detecting vulnerabilities before they are exploited.

Cyberfraud on the rise: technology as a shield for businesses

In a world of constant threats, real-time detection and prevention make all the difference. Imagine starting your day with the news that millions of your bank’s customers have fallen victim to a cyberattack. This became a reality last year when cybercriminals claimed to have gained access to Santander Bank’s data, demanding millions of dollars in ransom. While the bank did not confirm the exact details, it admitted to a data breach.

Quantum Chip Breakthroughs: Why Machine Identity Resilience Can't Wait

Quantum computing isn’t just coming—it’s barreling toward us, flipping the rules of cybersecurity like a table in a bad action movie fight scene. And it begs the question every CISO and IT security professional should be asking right now: Are we ready for the quantum leap? While this groundbreaking technology promises extraordinary advancements, from AI breakthroughs to disease modeling, a darker shadow lurks beneath its potential.

Beyond the PCI DSS v4.0 Deadline: Feroot Ensures Compliance

The compliance deadline (March 31, 2025) for PCI DSS v4.0.1 is over. This date was a big change for global information security rules. It’s now April 1, 2025, and companies need to ask: “What’s next?” Some organizations haven’t finished requirement 6.4.3 (script integrity verification) or requirement 11.6.1 (browser protection controls). They must act fast to avoid non-compliance consequences.

Cloud Security in 2025 What CISOs Need to Prepare For with João Pedro Gonçalves and Michael Tremante

In this episode of The Connectivity Cloud Podcast with Cloudflare, host Mark Dembo is joined by João Pedro Gonçalves, CISO and Managing Director at EQT Group, and Michael Tremante, Senior Director of Product at Cloudflare. Together, they explore critical security trends for 2025, from AI-powered threats to regulatory changes to practical strategies for balancing protection with usability. What You’ll Learn.