Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Random but Memorable - The Festive Quiz Special ft. Jack Rhysider and Carole Theriault

It's our final episode of the year! We’ve pulled together a panel of special guests for the fun and festive Security Quiz of the Year - 2023 edition. 🎄📝🎅 Podcasting royalty, Jack Rhysider from Darknet Diaries and Carole Theriault from Smashing Security, join the panel to help us unpack another year in cybersecurity. Bring on the belly-laughs! 🤣 We also crown the ultimate winner of HackerNoHacker in the grand finale, and unveil our brand new game for 2024: Security Blank. 🥳👑

What is an Attack Surface? - Defining, Identifying, and Mitigating Cyber Risks

Attack surface management refers to the process of identifying, assessing, and managing the potential vulnerabilities in an organization’s technology infrastructure. It involves analyzing and understanding all possible entry points that attackers could exploit, such as network devices, applications, APIs, and user access points.

What is Rate Limiting? - Definition, Methods, and Why It Is Important

Rate limiting is a mechanism used to control the amount of data or requests that can be transmitted between two systems within a specified time period. It helps prevent abuse, protect system resources, and ensure fair usage for all users. By implementing rate limiting, organizations can mitigate the risk of server overload, improve network performance, and enhance overall security.

What is API Authentication?

API authentication is a combination of technology and process that proves or verifies the identities of users who want access to an API. Specifically, API authentication involves the use of a software protocol to verify that users are who they claim to be when a client makes an API call. API authentication solutions are usually set up to block access to an API if they detect something wrong with the user’s identity during the API call. It’s online verification of ID, a gatekeeping countermeasure that defends APIs from access by malicious actors. Remember, too, that in many cases, the API user is a machine, not a person.

SolarWinds CEO Blames Intern for 'SolarWinds123' Password Leak Scandal! || Razorthorn Security

Dive deep into the SolarWinds scandal as the former CEO points fingers at an intern for the notorious 'SolarWinds123' password leak! Uncover the critical lapse in password security that lingered undiagnosed for years. In 2019, an independent security researcher stumbled upon 'SolarWinds123' exposed on the public internet, leading to a stern warning to the company about the vulnerable file server.