Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Unrealistic Cybersecurity Job Expectations: The Talent Gap Issue | Razorthorn Security

Amy Stokes-Waters critiques the unrealistic expectations in cybersecurity job descriptions, highlighting a significant industry challenge. Discover why demanding expertise in both SOC operations and pen testing for a single role, with insufficient compensation, exacerbates the talent gap. This clip exposes the harsh realities of the cybersecurity job market and the need for more realistic hiring practices to attract and retain skilled professionals.

AI Awareness Gap: Bridging the Disconnect Between Tech Experts and the Public | Razorthorn Security

Amy Stokes-Waters sheds light on the disconnect between technology enthusiasts and the general public's interest in tech, specifically AI advancements. In this engaging clip, Amy discusses the challenge of communicating complex tech concepts, like AI-generated content, to those outside the IT sphere. She emphasizes the need for better education on technologies that are reshaping our media landscape. Dive into this discussion to understand why simplifying tech talk is essential for broader awareness and acceptance.

Third Party Exclusions - Tanium Agent FAQs - Tanium Tech Talks #89

My endpoints have other agents beside Tanium. How do I get them to play well together? The onboarding checklist for every new Tanium customer includes a step on third party agent exclusions. Most IT shops have anywhere from 5 to 15 agents running on their servers and workstations, everything from antivirus to data loss prevention. So how can we make sure that Tanium functions well alongside those other agents? This is the next installment in our Tanium Agent FAQ series.

Virtual Endpoints (VDI & VMs) - Tanium Agent FAQs - Tanium Tech Talks #90

How do I tune Tanium for virtual infrastructure like VMs and VDI? Many folks who have worked in IT ops are familiar with the struggle of keeping virtual infrastructure properly resourced with memory, disk, CPU, and network. Sometimes it’s a balancing act of hardware, budget, and virtual machines. Now you’re deploying a real time agent on every guest on those virtual hosts, so how can we make sure it doesn’t create a resource storm?

Agent Impact on Endpoints - Tanium Agent FAQs - Tanium Tech Talks #88

Often we get the question, “What is the impact of the Tanium agent on the endpoint?” Today we’re going to unpack that answer as part of a series on optimizing the Tanium agent for your environment. In this series we’re going to explore expectations for endpoint agent load, look at agent tuning, talk about proper anti-virus exclusions, what to consider for virtual infrastructure, and more. Today we’re going to focus on the baseline load of the Tanium agent on your endpoints: disk, memory, CPU, network.

Preparing for PCI SSF Assessments and Audits Tips and Strategies

Welcome to our latest webinar recording on “Preparing for PCI SSF Assessments and Audits Tips and Strategies”, presented by VISTA InfoSec. This webinar provides an in-depth understanding of the Payment Card Industry Software Security Framework(PCI SSF) assessment and how to conduct audits and address the unique security challenges associated with software development and maintenance in the payment card industry.

The Evolving Perception of Cybersecurity: A Funding Gap Analysis | Razorthorn Security

Join Amy Stokes-Waters as she discusses the significant shifts in how cybersecurity is perceived over the last five years, highlighting a persistent challenge in funding. Despite spending $450 billion on information security, the scale of criminal activity, valued at $9.5 trillion, suggests a dire need for increased investment. This clip explores the financial discrepancies and emphasizes why robust funding is crucial to effectively combat cyber threats.

Secure Your IoT: Mastering Conscious Interaction with John Szczygiel

Dive deep into the world of IoT security with John Szczygiel as we explore the critical importance of conscious interaction between hosts and panels. In today's digital age, ensuring the safety of your IoT devices is not just a necessity; it's a responsibility. Join us at Brivo as we uncover the secrets to maintaining robust security protocols and learn how to protect your smart spaces from potential threats. Don't miss out on this insightful journey into the heart of IoT security. Remember, knowledge is power, especially when it comes to safeguarding your digital world. 🚀🔒