Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Building Resilient Organizations around IT and Cybersecurity

In this program, we hear from industry leaders focused on how to transform their teams and organizations while facing these challenges and how they address the gap in technically skilled employees while trying to foster this transformation. Speakers: Ed Hubbard, Director, Site Reliability and Monitoring - Travelport Mitch Ashley, CTO, Techstrong Group Principal - Techstrong Research James Brodsky, Group Vice President, Global Security Strategists - Splunk.

Securing Your Cloud Infrastructure with Azure & Tines

In the third instalment of "Tines, securing your cloud infrastructure" we look at two stories designed to save money and resources and close potential security gaps in your Azure environment. Firstly, we'll address the task of 'Updating groups assigned to a user in Azure Active Directory' which allows admins to update a user's group membership in Azure Active Directory. This is essential for adding extra security to accounts flagged for suspicious activity and protecting the team & company as a whole.

Applying Vulnerability Intelligence to CVSS and SSVC Frameworks

In this presentation, we explore the intersection of vulnerability intelligence and prioritization frameworks such as CVSS and SSVC as a means for strategically and rapidly prioritizing vulnerabilities to stay ahead of exploitation risks. We delve into the process of applying real-time threat intelligence tailored to the vulnerability landscape to enhance decision-making, optimize resource allocation, and ensure a precise and proactive defense against cyber threats.

Striking the Right Balance: Compliance vs. Real Cyber Risks | Navigating Organizational Priorities

In our latest exploration of cybersecurity challenges, we delve into the delicate balance organizations must strike between compliance efforts and the real cyber risks they face from the outside world. It's a common pitfall for organizations to develop a higher tolerance for compliance risks, often channeling significant resources and funds into demonstrating adherence rather than actively managing and mitigating specific threats.

Random but Memorable - Episode 12.1: Data Breach Box Set with Jayson E Street

We're back! Join the podcast crew for a brand new season of random security. We're kicking off our first episode with notorious hacker and expert security consultant, Jayson E. Street. Settle in, as he recalls how understanding human behavior led him to successfully robbing banks and organizations on five different continents.

What are secrets? Why hardcoded secrets are a security risk. Explained in 60 seconds

Secrets like API keys, Certificates, and credential pairs are used throughout modern software development. However, these pose a significant risk as attackers are always after them to gain unauthorized access to our system. This video explains in 60 seconds why hardcoding secrets or insecurely storing them is a security issue. The video also addresses some tools to use to manage your secrets or to scan your sourcecode for secrets,