Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

An Introduction to AWS Security

Cloud providers are becoming a core part of IT infrastructure. Amazon Web Services (AWS), the world's biggest cloud provider, is used by millions of organizations worldwide and is commonly used to run sensitive and mission-critical workloads. This makes it critical for IT and security professionals to understand the basics of AWS security and take measures to protect their data and workloads.

API Predictions for 2024

Is Salt Security a fortune teller? We’re not sure if we’d go as far as to say that, but we certainly have had our fair share of precognitive moments. In today’s virtual age where everyone is utilizing and relying on digital landscapes, people’s data is constantly being put online. As technology advances and more people go online, bad actors and cyber threats use vulnerabilities in Application Programming Interfaces (APIs) to get access to sensitive data.

EP 43 - Breaking Things in the Name of Cyber Resilience

Guest Dr. Magda Chelly, Managing Director and CISO of Responsible Cyber, joins Trust Issues host David Puner for a conversation about third-party risk management and cyber resilience. Dr. Chelly underscores the imperative of prioritizing identity management, particularly as decentralized work environments are becoming the norm in today’s evolving digital landscape.

Outstanding ROI of Security Awareness Training

As an InfoSec professional, one of your important responsibilities is to minimize expensive downtime and prevent data breaches. Skyrocketing ransomware infections can shut down your network and exfiltrate data. Phishing is responsible for two‑thirds of ransomware infections. You know this and need help articulating the value of KnowBe4 to your CFO and leadership. This guide showcases real ROI experienced by KnowBe4 customers to help you present a strong business case for the investment.

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR

For years, Microsoft has been making significant inroads in the security space, earning number-one rankings from top industry analyst firms IDC and Forrester for its endpoint and extended detection and response (XDR) security tools. Taking full advantage of these tools, however, requires some significant know-how and 24x7 staffing, prompting many to turn to a managed detection and response (MDR) service provider for help.

AI and privacy - Addressing the issues and challenges

Artificial intelligence (AI) has seamlessly woven itself into the fabric of our digital landscape, revolutionizing industries from healthcare to finance. As AI applications proliferate, the shadow of privacy concerns looms large. The convergence of AI and privacy gives rise to a complex interplay where innovative technologies and individual privacy rights collide.

3 Critical Steps for Application Security Teams in 2024

Software development practices are rapidly changing, and so are the methods adversaries use to target custom applications. The rise of loosely coupled applications, along with an impressive increase in code deployment speed, has resulted in a growing attack surface with more software architecture and imported dependencies. Application security (AppSec) teams are often outnumbered by software developers and struggle to keep up with frequent code changes.

Navigating the Reality of AI: Debunking the AGI Myth and Addressing Current Challenges #podcast

Delve into the realm of Artificial Intelligence with me as we unravel the truths about AGI (Artificial General Intelligence). In this video, we'll address the misconceptions and emphasize the current state of AI, focusing on the challenges posed by sophisticated language models (LLMs). Let's acknowledge the reality – AGI isn't around the corner, and there are crucial issues to tackle now. We'll explore the impact on society, jobs, and cybersecurity posed by the existing level of AI sophistication.