Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Beyond CVSS: Mitigating Alert Fatigue, Accurately

CVSS score is valuable for assessing open vulnerability risk. However, despite the obvious difference in risk, CVSS scores overlook the distinction between vulnerabilities in staging versus production. This issue compounds with factors such as the number and types of applications, vulnerability types, and zero-day threats. Ultimately, leading to Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

Falcon Data Protection Preventing GenAI Data Loss: Demo Drill Down

Though GenAI is a great productivity tool, many organizations risk losing sensitive data. CrowdStrike Falcon® Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach in making GenAI safer for organizations. In this demo, see how easy it is to stop sensitive data from leaking into web-based GenAI tools like ChatGPT.

Economic Panic: Exploring the Dual Nature of Employment in the Age of AI | Razorthorn Security

Delve into the current economic landscape of the West with us as we explore the phenomenon of job redundancy and the rise of dual employment. Despite some attributing layoffs to AI, the reality may be a broader downturn in the economy. Join the discussion as we uncover the motivations behind individuals opting for multiple jobs, driven by the desire for higher earnings and the perception of overworking. Discover how programmers, in particular, navigate dual roles, potentially working for both legitimate companies and malware operators, exploiting the system for financial gain.

Revolutionizing Security: The Power of Digital Call Boxes in Multi-Building Complexes

In today's fast-paced world, the security and management of multi-building environments pose unique challenges. Traditional methods often fall short in providing the efficiency and safety needed. Enter the era of digital transformation, where digital call boxes emerge as a game-changer in streamlining security operations. In this video, Lucas Ingala delves into the early adoption of these innovative solutions, shedding light on how they revolutionize security and management across multiple buildings. 🏢🚀

Defending Your Critical Data With Rubrik & CrowdStrike Falcon LogScale

Your backup data hosts useful information that can be used to identify potential attacks. In this quick demo, we'll show you how easy it is to share insights from Rubrik Security Cloud with your Security Operations team to help detect, respond to and recover from cyberattacks.

Understanding Supply Chain Risk - Using SCA to protect your application

Understanding our supply chain means understanding all the components that make it. But this is harder than it appears. Open-source components make up 80 - 90% of our application's source code, but we must also remember that our open-source components are also made from open-source components, it's like supply chain inception. SCA or Software Composition Analysis is a security tool that looks at your entire supply chain and outlines vulnerabilities, including transitive or downstream dependencies.