Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Trustwave's 7-Step Guide to Building a Healthcare-Focused Cybersecurity Framework

Healthcare organizations face increasing challenges in safeguarding patient data. With the rise of cyber threats and stringent regulatory requirements and potential patient impact, it’s crucial to have a robust security framework in place. Trustwave offers comprehensive solutions tailored to the unique needs of the healthcare sector and has the in-house ability to manage any organization’s security apparatus.

Navigating Mental Health, Narcissism & Burnout in Cybersecurity with Lisa Ventura MBE

Welcome to Razorwire, the podcast where I, Jame Rees, cover the cybersecurity topics that matter with expert guests from across the industry. We aim to help cybersecurity professionals enhance their skills, improve their work performance, and boost their overall quality of life in this demanding field.

Snyk named a 2024 Gartner Peer Insights Customers' Choice for Application Security Testing for the 3rd consecutive year

Snyk, a leading provider in developer security, is excited to share that we’ve been named a Customers’ Choice in the 2024 Gartner Peer Insights Voice of the Customer for Application Security Testing for a third consecutive year. Gartner defines the Application Security Testing category as products and services designed to analyze and test applications for security vulnerabilities. This distinction is based on meeting or exceeding user interest, adoption, and overall experience.

Ransomware as a Business with Ken Westin from LimaCharlie

Ken Westin, Senior Solutions Engineer at LimaCharlie, joined us for Defender Fridays to discuss Ransomware as a Business. Join us every Friday as we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry.

Webinar Replay - AI Security Testing: Prompt Injection Everywhere

Kroll’s LLM penetration testing has seen it analyze data sets of OpenAI models, non-public models and RAG systems. It has used this to produce an anonymized dataset that catalogs vulnerabilities from all LLM engagements. Kroll has found a worrying prevalence of prompt injection attacks in the LLM cases it has investigated and shares its findings in this briefing.

Protecto Snowflake Integration Demo: Safeguard Sensitive Data!

Welcome to the Protecto Snowflake Integration Demo, where we show you how to safeguard sensitive data using Protecto’s advanced AI-powered masking tools! In today’s world, businesses using Snowflake for AI and analytics face significant risks with sensitive information hidden within unstructured data like comments and feedback columns. Protecto provides a unique solution, precisely masking only the sensitive parts of your unstructured data while leaving the rest untouched, ensuring your datasets remain valuable for analysis.

Birthday Week 2024 Recap: AI Audit, Speed Brain, Developer Tools and more!

In this week’s episode, we recap our main innovation week of the year, Birthday Week, and its many announcements. Host João Tomé is joined by Brendan Irvine-Broque (Group Product Manager) and Kelly May Johnston (Director, Product Management). We dive into some of the key announcements of the week, including the AI audit and major improvements in security, performance, and AI/ML support, such as enhanced threat detection and analytics, faster navigation with Speed Brain, and expanded free tools for all users.