Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ransomware Strikes! What to Do in the First 60 Minutes: Understanding the Threat (Part 1)

Are you prepared for a ransomware attack? In this crucial first part of our "Ransomware Strikes! What to Do in the First 60 Minutes" series, we pull back the curtain on one of the most terrifying cyber threats facing businesses today. Join VISTA InfoSec, an officially empaneled organization with CREST, PCI Council, CSRO SG, SWIFT, and CERT-IN, as we dive deep into the reality of ransomware in 2024. We'll reveal staggering statistics, including the average cost of an attack ($5.13 million!) and the heartbreaking truth about small businesses.

EP 10 - A new identity crisis: governance in the AI age

In this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation.

API Security Is a Business Problem-Not Just an IT One

APIs are more than technical components—they're business-critical assets. In this powerful moment, Jeremy Dodson lays out why frameworks aren't enough and why companies must treat API security as a core business priority. Security leaders: it’s time to shift your mindset and protect real data flows, not just check boxes.

The MemcycoFM Show: Episode 5 - DNS Cache Poisoning Prevention: How to Protect Accounts in Real-Time

For security teams, it’s no great revelation to say that DNS cache poisoning prevention is essential for guarding against attacks using that vector. But it’s easier said than done. While traditional network-layer defenses like DNSSEC reduce poisoning risk, they can’t fully prevent it. Downstream – after redirection – bad actors await, ready to harvest credentials, bypass MFA, and take over accounts.

Why Hackers Ignore Zero-Days (And What They Use Instead)

You'd think hackers use the latest zero-day exploits, right? WRONG! PwC's threat intelligence reveals hackers are actually exploiting OLD vulnerabilities that companies just... forgot to patch While cybersecurity teams chase shiny new threats, criminals are walking through the front door with keys we left lying around. The scariest part? Even criminal groups (not just nation-states) are making this their primary attack method.