Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Random but Memorable - Episode 13.8: Relic Robot Printer Report with Troy Bettencourt from IBM

What's the true cost of a data breach? To find out, we invited Troy Bettencourt to the podcast where we dissect IBM's industry-leading Cost of a Data Breach Report for 2024. We unpack all the eye opening stats and figures from this year's report, to understand what the true cost of a data breach is and what businesses and regular people can do to prepare for a potential future data breach.

Global age verification laws: how to maintain compliance and keep friction low

New age verification laws are popping up around the world. Learn what these laws are and how to stay compliant. Kerwell is a product marketing manager focused on Persona’s identity verification solutions. He enjoys watching basketball and exploring the world with his German Shepherd. Kerwell is a product marketing manager focused on Persona’s identity verification solutions. He enjoys watching basketball and exploring the world with his German Shepherd.

What is Watchlist Screening? A Complete Guide

A guide to using watchlists to keep your business safe. Shana is a product marketing manager focused on the Persona platform and marketplaces. You can usually find her running around San Francisco with a coffee in hand. Shana is a product marketing manager focused on the Persona platform and marketplaces. You can usually find her running around San Francisco with a coffee in hand.

2024 Trustwave Risk Radar Report: Cyber Threats to the Retail Sector

As the holiday shopping season approaches, the 2024 Trustwave Risk Radar Report: Retail Sector reveals that cybercriminals have sharpened their tactics, utilizing ransomware and phishing attacks that exploit well-known online brands to target retailers and consumers directly. These skills will likely be employed to infiltrate various retail organizations throughout the year.

Stress, Certification, and Pen Testing: Nathaniel Shere's Journey - Secrets of AppSec Champions

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Don't be fooled: data security requires global data lineage, not "local lineage"

Securing data today requires the context provided by data lineage: where data came from, who interacted with it over time, which systems have used it, and more. But buyer beware: many vendors now claim to offer “data lineage” that only provides a tiny fraction of the context of true, global data lineage.

Simplify and streamline identity security and management to protect your business using AWS Managed Microsoft Active Directory and One Identity Active Roles

Active Directory (AD) is the most prolific identity platform in the world. Like many companies already using AD on-premises, you may now be considering extending your identity environment to the cloud to create a hybrid landscape. There are many reasons behind this: resource constraints, strategy evolution, merger, acquisition or otherwise.

GigaOm Declares Torq the Autonomous SOC Leader, Dramatically Outpacing Legacy Vendors

GigaOm provides technical, operational, and business advice for IT’s strategic digital enterprise and business initiatives. GigaOm applies proven research and methodologies designed to avoid pitfalls and roadblocks while balancing risk and innovation, empowering enterprises to successfully compete in a changing business atmosphere. GigaOm recognizes Torq as the only Hyperautomation vendor capable of delivering true autonomy to the SOC without vendor lock-in.

Cybersecurity Expert Gaurav Sood Addresses Digital Arrest Scams on CNBC Awaaz | miniOrange

@NarendraModi Calls for Vigilance and Warns of “Digital Arrest” Scams in Digital arrest' frauds have reached alarming levels in India, with losses exceeding ₹120 crore to scammers posing as law enforcement. These fraudsters prey on victims by threatening arrest and demanding large sums as bail or clearance fees. Recent cases reveal that 46% of these attackers operate from Southeast Asia, deceiving individuals with claims of illegal goods or fake documents in their names.