Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Trustwave SpiderLabs: The Ransomware Trends Confronting the Energy and Utilities Sector

Increasing frequency, new threat groups emerging, the rise of ransomware-as-a-service (RaaS) attack model, and third-party attacks are just a few of the dangerous trends Trustwave SpiderLabs details in Energy and Utilities Sector Deep Dive: Ransomware Trends. This report supplements the just released 2025 Trustwave Risk Radar Report: Energy and Utilities Sector. This broader and more comprehensive report analyzes the energy and utilities sector’s major threats and trends.

#188 - The MSSP Alert 2024 Pricing Benchmark Report with Sharon Florentine from CyberRisk Alliance

On this episode of The Cybersecurity Defenders Podcast we speak with Sharon Florentine, Senior Managing Editor at CyberRisk Alliance, about the MSSP Alert 2024 Pricing Benchmark Report. Sharon is a master technology storyteller and editor with over two decades of experience in shaping the way we understand and engage with technology. Sharon's career spans an impressive range of platforms, from books and print magazines to podcasts, live events, and digital media. She's covered everything from AI and cybersecurity to career development and diversity in tech.

Using Data Pipelines for Security Telemetry

It’s a warm, sunny day as you lie in the sand under a big umbrella. Suddenly, you feel the waves crashing against your feet, only to look down and see numbers, letters, usernames, and timestamps. You try to stand up, but you feel the tide of big data pulling you under… With a jolt, you wake up, realizing that you were having another nightmare about your security Data Lake and analytics.

Keeper Webinar - Zero-Trust KeeperPAM: A Unified Cloud Platform

Watch the recording of our exclusive webinar featuring Craig Lurey, CTO & Co-founder of Keeper Security. Discover how KeeperPAM is revolutionizing privileged access management by seeing a walkthrough of the newest KeeperPAM features and a live demo showcasing its functionality.

How AI Can Crack Your Passwords

As AI becomes more advanced, it's important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. Cybercriminals can use AI to perform 3 different types of password-cracking attacks: acoustic side-channel, brute force and dictionary attacks. Learn more about these AI-powered password-cracking attacks.

Global Cybersecurity Needs Global Standards #shorts #podcast #datasecuritydecoded #cybersecurity

"I’m pro-regulation, but the lack of international standards makes compliance a huge challenge.” - Kris Lovejoy Cybersecurity today isn’t just about protection but navigating a fragmented regulatory landscape. Kris explains why standardization is key to resilience. Catch her insights on! Key Points: Why regulations matter Challenges of global compliance Building resilience across borders.

Simplifying Zero Trust Security for AWS with Teleport

Speakers: Managing secure access has become a critical challenge for organizations using AWS at scale. Traditional security approaches, like passwords and virtual private networks (VPNs), are not sufficient to protect growing infrastructures while maintaining productivity. This webinar, "Simplifying Zero Trust Security for AWS with Teleport," explores how Teleport enables a modern, identity-first approach to AWS access.

How Flexible Filters Enhance API Security #CybersecurityTools #SecurityFilters #ThreatAnalysis

Learn how flexible filtering and session context improve API security. Wallarm enables deep analysis of attacks, from failed logins to SQL injections, using response codes and request types. Discover why session context is essential for identifying and preventing threats.

Top 10 Threat Intelligence Jobs in the UK

The global threat intelligence market size was valued at USD 5.80 billion in 2024. The market is projected to grow from USD 6.87 billion in 2025 to USD 24.05 billion by 2032, exhibiting a CAGR of 19.6% during the forecast period. This tremendous growth translates into an increase in both the supply and demand for skilled professionals in threat intelligence.