Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AlgoSec for IaC: How to identify risks from your pull requests

This video demonstrates how the AlgoSec platform integrates into your DevOps workflow early in the game, automatically identifying connectivity risks and providing ways to remediate them. You never have to leave where you're working to write better code. IaC Connectivity Risk Analysis enables immediate feedback right where you're working in the pull request by providing risk check results as comments.

What is firewall optimization?

Firewall optimization (also known as firewall analysis) is the process of analyzing and adjusting the configuration and policy set of a firewall to improve performance and security. This process involves reviewing and corelating log data and device configurations, identifying potential vulnerabilities and weaknesses, and providing recommendations for remediation. Performing these processes is complex, which is why tools like firewall analyzers are useful.

Merchant Onboarding Made Easy: Benefits of Using a KYC API

Onboarding merchants is crucial for ongoing development if you’re a merchant acquirer or payment service provider (PSP). Of course, you want more businesses since they generate more sales. On the other hand, bringing on dubious merchants that are likely to approve fraudulent transactions merely leads to fees and losses that have an effect on your bottom line. The world of payments is expanding quickly and changing all the time as fraudsters become more skilled and fraud assaults rise.

Mitigating path traversal vulns in Java with Snyk Code

Path traversal is a type of security vulnerability that can occur when a web application or service allows an attacker to access server files or directories that are outside the intended directory structure. This can lead to the unauthorized reading or modification of sensitive data.

Cybersecurity Advice for Businesses Without Information Security Professionals

In this video, we explore what businesses without information security professionals can do to protect themselves from cyber threats. While it would be ideal for all businesses to have experienced cyber personnel who can advise on critical assets and best steps, this is not always possible. Connect with Your host James Rees Hello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.

Nightfall AI Rightway Case Study Part 2

Karim Beldjilali, current Nightfall CISO and former CISO of Rightway, speaks about how security has shifted from prevention to safe enablement of collaboration. This informed Karim's selection of security tools as he knew he needed to leverage HIPAA compliance solutions. in line with this philosophy.

Nightfall AI Rightway Case Study Part 3 - Rightway Before & After Nightfall

Karim Beldjilali, current Nightfall CISO and former CISO of Rightway detail Nightfall's 90 day impact on HIPAA compliance initiatives in his former role and why the platform is useful for the security and enablement of secure cloud usage in healthcare settings.