Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

#153 - Unpacking the hacker mindset with Ken Westin, Senior Solutions Engineer at LimaCharlie

On this episode of The Cybersecurity Defenders Podcast, we unpack the hacker mindset with Ken Westin, Senior Solutions Engineer at LimaCharlie. Ken is a seasoned thought leader in cybersecurity who has spent years analyzing and understanding the intricacies of cyber threats and the methods behind them. Ken has a unique ability to identify emerging trends in the industry and for figuring out how businesses can protect themselves before they fall victim to attacks.

Keeper 101 | Enterprise: Risk Management Dashboard

The Keeper Risk Management Dashboard is a powerful feature of the Keeper Admin Console that provides comprehensive security posture information covering end-user deployment, utilization, cloud configuration, and event monitoring. This critical data helps administrators ensure that risks are remediated and compliance is enforced effectively. The Risk Management Dashboard monitors key metrics and leverages Keeper Security's Benchmarks to enforce the highest level of security in your environment across all users and devices.

Embracing Resilience in Cybersecurity: Preparing for Recovery and Thriving Post-Attack #shorts

In cybersecurity, the real challenge isn’t just preventing attacks; it's about how you rebound and continue delivering your digital products and services when an attack hits. The crucial focus must be on preparedness and resilience, not just avoidance. It's natural to want to ignore the possibility of a breach—our minds prefer to focus on positive scenarios. But effective planning requires embracing the pessimistic side of our intellect.

Measuring Your Data's Risk Exposure with Bipul Sinha, CEO, Chairman, and Co-Founder of Rubrik

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

The Secure Cloud-Native Journey: Development, Deployment, and Defense

David Hendri, Solvo’s CTO & Co-founder, and David Melamed, Jit’s CTO & Co-founder, discuss the shift from traditional software security to modern cloud environments. They cover how cloud visibility, automation, and vulnerability prioritization improve security without slowing developers and share insights on future trends, including AI’s impact on cloud security.

Random but Memorable - Episode 13.5: Human Factor Authentication Pitch with Dr. Erik Huffman

Are there personality traits that make some people more vulnerable to cyberattacks? We lift the lid on this and more in a one-of-a-kind interview with cyberpsychologist, Dr Erik Huffman. Tune in, as Erik unpacks the human-element of security, how AI is transforming social engineering, and how we can turn humans from the weakest security link into our greatest superpower.

Five Hidden Costs of Cyber Attacks

In the modern, interconnected world, no organization is immune from a cyber attack. Indeed, most experts agree that it is a matter of “when,” not “if” an organization will be targeted by threat actors. If an attack is successful, the immediate costs — including potential ransom payments, lost revenue, and costs associated with remediation and restoration — can be substantial.