Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Encryption Backdoors: Balancing Security and Privacy

Join us in this thought-provoking video as we delve into the heated debate surrounding encryption backdoors. Should technology companies be compelled to create backdoors in their encryption systems to enable surveillance and facilitate investigations? We explore the arguments for and against this contentious issue, considering the need for security while preserving individual privacy. We also address concerns about government overreach and historical instances where privacy has been compromised. Learn about executive orders such as EO 1227 and the implications they have on mass surveillance and privacy rights. Engage in the conversation and share your perspective on this crucial topic that impacts us all.

Responding to remote service appliance vulnerabilities with Sumo Logic

For those responsible directly or indirectly for the cyber defense of their organizations, June 2023 is proving to be an extremely challenging month. In this month alone, vulnerabilities were discovered in various appliances, ranging from CVE-2023-27997 impacting FortiGate devices to CVE-2023-35708 impacting MOVEit Transfer software as well as the exploitation activity discovered of Barracuda appliances via CVE-2023-2868.

Enhance Security and Efficiency for your Unstructured Data with Rubrik and Dell

Unstructured data is a prime target for ransomware attacks, making it crucial for organizations to protect and manage it effectively. Currently, it is estimated that 80-90% of all data generated falls into the unstructured category, consisting of files and objects. Organizations rely on unstructured data to store sensitive information, intellectual property, and other invaluable corporate assets.

Migrating Apollo Codegen to GraphQL Code Generator

GraphQL has become a popular choice for building APIs in recent years. In projects using Typescript and Apollo Client, such as Rubrik’s, it is very helpful to map GraphQL schema to types and interfaces and one of the most popular tools for generating these types and interfaces based on a GraphQL schema is Apollo Codegen.

CCTV Dilemma: Caught in the Act, but Uninformed? | Privacy vs Security

We explore a moral and legal quandary surrounding the use of CCTV cameras in public spaces. Imagine a scenario where you have installed a CCTV camera to monitor a public roadway, inadvertently capturing your neighbor's car being broken into without their knowledge. Can you ethically and legally show them the footage as proof that you are not involved or aware of their monitoring? We delve into the complexities of this situation, considering the technicalities, legal obligations, and the duty we have to our community. Join the discussion and share your insights on this challenging subject.

Cybersecurity's Inner Circle Breaks Down the Issue of MSPs Auditing Their Own Work

The cybersecurity realm is a constant battleground where the old and the new continuously clash, and one of the most recent debates centers around Managed Service Providers (MSPs) and their tendency to audit their work. Enter three seasoned cybersecurity mavens - Blake Schwank from Colorado Computer Support, Robert Giannini from GiaSpace, and Ashu Bhoot from Orion Networks - who recently provided an in-depth perspective on this pivotal topic.