Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

This Month in Datadog: Heatmaps Updates, API Catalog, Content Packs for Cloud SIEM, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. This month, we put the Spotlight on a pair of Heatmaps updates..

Breaking the Barrier of Dynamic Testing CI Spark Live Demo

The manual effort required to set up dynamic testing methods such as feedback-based fuzzing, presents a major barrier to adoption to many dev teams. CI Spark obliterates this barrier by automating the most labor-intensive parts of AI-powered white-box testing, which is identifying relevant entry points (e.g., an API that handles user data) and developing tests that are tailored to their structure.

AI Hallucinations and Manipulation: How to Use AI Coding Tools Securely (part 1)

Generative AI can help you write code faster, but is it secure? Learn how you can leverage the power of AI to increase your velocity while mitigating risks and staying secure. Learn from security experts Liran Tal & Simon Maple in a hands-on session where they walk through.

Is retail a security fail? Make sure your PoS is not a POS

Whether it's a brick-and-mortar storefront or an e-commerce platform, no player in the retail space is safe from cyberattacks. Over the past decade, we have seen major breaches of big-name stores, resulting in multi-million dollar settlements and hundreds of millions of affected users. But what exactly is going on here? We will examine the mechanisms cybercriminals use to exploit retail stores and platforms, what they look for, and, most importantly, what can be done to thwart threats and leave cyber criminals on the shelf.

SIG Lite Questionnaire

The SIG Lite Questionnaire is now available as a part of UpGuard’s questionnaire library! We’ve partnered with Shared Assessments to offer this leading security framework to help businesses identify, assess, and mitigate cyber risk in their third-party vendors. SIG Lite is one of the most popular questionnaires for assessing vendors and covers a wide range of IT security and risk management topics, including data privacy, network security, and vulnerability management!

Demystifying Deep Learning: Unraveling the Brain-Inspired Evolution of AI || Razorthorn Security

Dive deep into the world of artificial intelligence with our latest video, "Unlocking the Power of Deep Learning: Exploring the Brain-Inspired Revolution in Machine Learning." In this comprehensive exploration, we'll unravel the fascinating concept of deep learning, a subset of machine learning, and understand how it's attempting to simulate the complexity of the human brain.

The Use Of AI In Cybersecurity - Consultants Roundtable || Razorthorn Security

Hello, and welcome to Razorwire. This week, I've had a great time discussing the fascinating topic of artificial intelligence (AI) and its potential impact on our industry, with my esteemed Razorthorn consultants, Tom, Jamie and Michael. We explore the different types of AI, including machine learning and chatbots, and discuss the challenges of achieving a low false positive rate and high general application. You'll gain valuable insights into the evolution of AI and why we MUST take seriously the very real potential for malicious actors to use it for nefarious purposes.