Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Secure Cloud-Native Journey: Development, Deployment, and Defense

David Hendri, Solvo’s CTO & Co-founder, and David Melamed, Jit’s CTO & Co-founder, discuss the shift from traditional software security to modern cloud environments. They cover how cloud visibility, automation, and vulnerability prioritization improve security without slowing developers and share insights on future trends, including AI’s impact on cloud security.

Random but Memorable - Episode 13.5: Human Factor Authentication Pitch with Dr. Erik Huffman

Are there personality traits that make some people more vulnerable to cyberattacks? We lift the lid on this and more in a one-of-a-kind interview with cyberpsychologist, Dr Erik Huffman. Tune in, as Erik unpacks the human-element of security, how AI is transforming social engineering, and how we can turn humans from the weakest security link into our greatest superpower.

Five Hidden Costs of Cyber Attacks

In the modern, interconnected world, no organization is immune from a cyber attack. Indeed, most experts agree that it is a matter of “when,” not “if” an organization will be targeted by threat actors. If an attack is successful, the immediate costs — including potential ransom payments, lost revenue, and costs associated with remediation and restoration — can be substantial.

Solving the cybersecurity skills shortage

Grand View Research predict that USA demand for MSP services will double by 2030, a compound annual growth rate of 13%. It’s a similar story in most developed markets as businesses seek to outsource their non-core IT activities to experts. Such a strong sellers' market would normally mean easy growth. But MSPs cannot hope to recruit and train sufficient cyber security engineers. America has a 500,000 strong cybersecurity job gap.

Top open-source CSPM projects to secure your cloud infrastructure

As more organizations move their critical infrastructure to the cloud, ensuring security has become a top priority. This is where Cloud Security Posture Management (CSPM) comes in. CSPM solutions validate the configuration of cloud services from a security perspective, ensuring alignment with best practices and compliance frameworks such as CIS Benchmarks, PCI-DSS, NIST, and others.

Physical Security In The Age Of Digital: Access Control System Vulnerabilities

Access control systems are the physical form of the layers of data, credential and identity controls underpinning the systems relied on every day. Yet, they can be an afterthought; even the most high-profile breaches of physical security systems can take years to rectify. Security Week highlights the vulnerabilities affecting Nice Linear, a widely used proprietary system in the world of smart homes. Over 2,500 individual vulnerabilities flagged in 2019 alone.

Empowering Teams for Better Security: A Conversation with Jigar Shah - Secrets of AppSec Champions

Developing a Security Culture: In today's highly digital and interconnected world, cybersecurity isn't just an IT issue; it's everyone's responsibility. Creating a robust security culture within your organization involves integrating security awareness into your daily operations. Train your employees, provide adequate resources, and define clear roles and responsibilities for security champions and influencers.