Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why should developers care about container security?

Container scanning tools, industry publications, and application security experts are constantly telling us about best practices for how to build our images and run our containers. Often these non-functional requirements seem abstract and are not described well enough for those of us that don’t have an appsec background to fully understand why they are important.

Defending the Digital Seas: Dismantling Cyber Crime with Disincentives and Alternatives #podcast

In this eye-opening video, we delve into the intriguing parallels between historical piracy and the contemporary world of cybercrime. Remember when pirates sailed the seas, preying on everyone in their path without any official refuge? Fast forward to today, where cybercriminals, like modern-day pirates, target unsuspecting individuals. Join me as we explore the concept of disincentivizing cybercrime, making it harder to succeed, and more painful if caught, and promoting alternative paths.

Lockdown Impact: Did Lockdowns Turbocharge the Rise of Cybercrime Services | Razorthorn Security

Unraveling the Cyber Odyssey: Did Lockdowns Propel the Explosive Growth of Cybercrime Services? Join us as we delve into the epic transformation triggered by global lockdowns, shaping the landscape of cybercrime services. Did the lockdowns accelerate the rise of new and sophisticated cyber services? Explore the dynamic forces at play and the undeniable impact on the cyber ecosystem. From ransomware's meteoric surge to the pivotal FBI takedown in 2015 that revealed the lucrative world of cybercrime revenue, we connect the dots to unveil the unfolding narrative.

Unveiling the Secret Realms: Private Intelligence, Mercenaries, and Cyber Intrigues #cybersecurity

Dive into the secret world of growing art! In this video, we explore the expansion of private intelligence and the mercenary sector, questioning whether cyber warfare is now part of their arsenal. Join the discussion as we shine a light on prominent players like NSO and uncover interesting facts. Are these industries integrating with cyber capabilities? We dissect the possibilities and shed light on the shadows of individual actions. From corporate espionage scandals to Uber's infamous software installation in drivers' cars, we uncover different aspects of industrial espionage.

Achievements and Aspirations: Reflecting on 2023 and Predicting 2024

2023 has been a busy year for cybersecurity. From changes in compliance and regulations to the ever-increasing number of attacks, there's a lot to talk about. Join us in reviewing the highs and lows of cybersecurity in 2023 and what we can expect to see as we enter 2024. Hear expert advice and commentating from Chris Clements, Gary Perkins, and Jerald Dawkins, Ph.D. Jerald Dawkins, Ph.D, is the Chief Technology Officer for CISO Global. He currently holds three patents for network gateway messaging systems and methods for tokenization to support pseudonymization of sensitive data and services.