Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Did You Hire a Spy? Risks and Strategies for Securing Remote Workers

In today’s high-stakes digital landscape, hiring remotely requires diligence and vigilance. Trust is important, but verifying that trust is non-negotiable. The consequences of negligence can extend beyond financial loss, affecting national security and the very foundations of an organization. By taking proactive measures, companies can significantly reduce the risk of hiring a spy or becoming a victim of corporate espionage.

Tackling the Non-Human Identity Crisis

As the landscape of Non-Human Identities (NHI) continues to expand, managing and securing these identities has become one of the most pressing challenges for organizations today. With automation and the increasing reliance on machine-to-machine communication, the stakes for securing these entities have never been higher. Did you know that over 80% of cloud breaches involve mismanaged or unauthorized machine identities?

Operationalizing TLSH for Detection with David Burkett

David Burkett, Cloud Security Researcher at Corelight, joined Defender Fridays to discuss operationalizing TLSH for detection which enables fast, scalable, and resilient identification of near-duplicate files, helping to uncover malware variants and similar threats with minimal false positives.

Ransomware's Evolution: Key Threat Groups Targeting the Energy and Utilities Sector in 2025

Ransomware has a long history, first established in 1989 with the introduction of the AIDS Trojan, of use by criminals to force organizations and regular people to hand over money. Trustwave SpiderLabs follows the continuously changing history of ransomware and those behind the malware in Energy and Utilities Sector Deep Dive: Ransomware Threat Groups, a supplementary report to the team’s just released 2025 Trustwave Risk Radar Report: Energy and Utilities Sector.

Modern Tech Old Systems on the Cloud! #shorts #datasecuritydecoded #cybersecurity #podcast

"If you don’t know what you have, you can’t secure it. And putting a 30-year-old system on the cloud doesn’t make it modern.” – Kris Lovejoy Cybersecurity starts with the basics: inventory and upgrades. Want to future-proof your business? Catch Kris’s insights on now.