Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

"What's our number?": Responding To Your Exposure to CrowdStrike Outage Event

Is cyber risk insurable? That question is often at the heart of the debate about the future of the cyber insurance industry. One of the primary drivers of that question is the insurance industry’s challenges when managing systemic cyber risk since many believe that systemic cyber risk has the potential to bankrupt the industry. While there hasn’t been a catastrophic cyber incident that has proven the skeptics right, there have been several close calls.

Privileged User Monitoring: Defending Against Insider Risks

Organizations are increasingly reliant on complex systems and vast amounts of sensitive data, which makes them attractive targets for cybercriminals. However, while external threats are often in the spotlight, insider risks posed by privileged users who have elevated access to critical systems and sensitive information often goes unnoticed.

BDRCloud - How to Perform Bare Metal Recovery | Direct Streaming Method

BDRCloud - Bare Metal Recovery - Step-by-Step Guide Welcome to BDRCloud How-to series! In this video, we'll guide you through the process of performing Bare-Metal Recovery using the Direct Streaming method. BDRCloud's Bare-Metal Recovery feature is helpful when dealing with complete system failures, allowing you to restore entire systems (Windows Servers or Workstations), to new or existing hardware.

Social Media Threats and Regulation with Jenny Reich (Georgetown Law Center)

From our San Francisco headquarters, we sit down with Jenny Reich, a Fellow and Adjunct Professor at the Georgetown Law Center on National Security. As an expert in social media law, Jenny examines social media's impact on misinformation, cybersecurity and journalism. In this episode taped during the 2024 RSA Conference, Jenny offers her expert perspective on growing congressional pressure for social media regulation, the origins of data breaches from chat rooms, Section 230 and TikTok as the new Gen Z search engine.

AI, Democracy and The Evolution of Internet Security with Bruce Schneier

In this episode, host Joao Tome and cryptographer and security technologist and public policy lecturer, Bruce Schneier discuss the evolving landscape of Internet security. They explore AI-related cybersecurity risks, the impact of new technologies on democracy, and the current state of the global Internet. Schneier examines how new technologies are impacting democratic processes worldwide and provides insights on balancing the delicate balance between privacy risks and benefits in the digital age. The conversation also covers the need for updated regulations and the future of post-quantum cryptography.

What is an account takeover?

Whether you’re a Halloween or comic con fan, dressing up as your favorite character is something you’ve probably done at least once in your life. As a kid, you were excited to put on that flimsy Batman mask and cape, thinking you looked just like the hero you saw on the movie screen. As an adult, getting or making the most move-accurate costume may allow other people to think that you are the actor in disguise.

CISA-FBI Issue Security Warning for Chinese-Manufactured Drones

Drones are becoming ubiquitous. They are sold as toys, used in industry, and as weapons of war, so the possibility of one becoming co-opted by a threat actor could result in severe damage, disruption of services, or data theft. In response, CISA and the FBI released a notification and guidance on Chinese-manufactured unmanned aircraft systems (UAS) aka drones, that could have vulnerabilities enabling data theft or that could facilitate network compromises.