Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is Security Automation?

Digital transformation initiatives like moving servers to the cloud, extending work-from-home privileges, and deploying more IoT devices have expanded attack surfaces, making it easier than ever for threats to slip through. At the same time, the number of cyber threats is growing fast. According to Security Magazine, a cyberattack now happens at least every 39 seconds.

What is the MITRE ATT&CK

The MITRE ATT&CK framework provides the cybersecurity community with information on more than 100 threat actor groups and the platforms they target. The data within the framework comes from publicly available cyber threat intelligence and reports and security teams and threat researchers. ATT&CK is available for free to anyone who wants to use it.

Random but Memorable - Episode 12.7: Zero Trust Fall Out with Dr. Chase Cunningham & Elliot Volkman

Think you know what zero trust is? Think again! This week, we welcome Dr Chase Cunningham & Elliot Volkman to the show to define what the zero trust security model looks like and debunk common misconceptions around it. Tune in, as we dive into how you can adopt zero trust in your organization, and deploy it successfully.

Secure Your IoT: Mastering Conscious Interaction with John Szczygiel

Dive deep into the world of IoT security with John Szczygiel as we explore the critical importance of conscious interaction between hosts and panels. In today's digital age, ensuring the safety of your IoT devices is not just a necessity; it's a responsibility. Join us at Brivo as we uncover the secrets to maintaining robust security protocols and learn how to protect your smart spaces from potential threats. Don't miss out on this insightful journey into the heart of IoT security. Remember, knowledge is power, especially when it comes to safeguarding your digital world. 🚀🔒

Why We Should Have Zero Trust in a Hybrid Public Sector Workforce

Those working in the UK public sector have seen significant upheaval over the last decade thanks to a combination of the long-term efforts to relocate civil servants outside London and, in recent years, the swift adoption of hybrid work practices necessitated during the pandemic. As a result, networks have expanded, the number of devices and endpoints to protect has grown considerably and potential vulnerabilities for attackers to target have increased.

Best API Security Product: Wallarm wins 2024 Cybersecurity Excellence Award

We are thrilled to announce that Wallarm has clinched the sought-after 2024 Cybersecurity Excellence Award, under the category Best API Security Product. Our unwavering commitment to pioneering solutions that safeguard digital ecosystems, and fortify API security amidst the evolving cyber threat landscape, has garnered industry-wide recognition. This accolade reaffirms Wallarm's position at the forefront of cybersecurity innovation, empowering businesses with confidence and resilience.

The Evolving Perception of Cybersecurity: A Funding Gap Analysis | Razorthorn Security

Join Amy Stokes-Waters as she discusses the significant shifts in how cybersecurity is perceived over the last five years, highlighting a persistent challenge in funding. Despite spending $450 billion on information security, the scale of criminal activity, valued at $9.5 trillion, suggests a dire need for increased investment. This clip explores the financial discrepancies and emphasizes why robust funding is crucial to effectively combat cyber threats.