Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Friday Flows Episode 11: Respond to & configure Terraform Cloud run task

The question of the week from a customer was: “How do we use Tines with our Infrastructure-as-Code methodology?” Today we’re looking at how to automate processes around Terraform Cloud, like documentation, opening tickets, and getting approval for changes in the cost of the infrastructure. Use this workflow to save time, maintain consistent records for audits, and manage incremental infrastructure costs.

Detect malicious files with BinLib: a private binary library

We’ll look at one of LimaCharlie’s newest features: Binary Library, or “BinLib”, a private repository of binaries observed in an organization. BinLib opens up new opportunities for detecting malicious files within an organization. Historical searching and YARA scanning allow you to take your binary detection to the next level, as we will observe and discuss in this session.

Deciphering Cyber Insurance, Acts of War, and Espionage

In this intriguing discussion, we delve into the complex world of insurance companies and their strategies for handling cyber threats, particularly when it comes to determining acts of war and espionage. We explore the blurry boundaries and challenges of insuring against these distinct yet interconnected risks in the ever-evolving cyber landscape. Join us for a candid conversation where we attempt to unravel these intricate dilemmas, acknowledging the difficulties in this domain that often leave us with more questions than answers.

CISA KEV's Known Ransomware Attribution

This past week, Patrick Garrity, Security Researcher at Nucleus, spent a lot of time exploring Cybersecurity and Infrastructure Security Agency's update the Known Exploited Vulnerabilities catalog, which now includes attribution to vulnerabilities associated with ransomware campaigns. In this short video, he explores this new addition and walks through the data visualizations he created to provide broader visibility into this new addition.

Securing tomorrow: A roadmap to holistic identity security success

iC Consult, a trusted partner of One Identity, is the world's leading independent consultancy, systems integrator, and managed services provider for IAM. In this video, Andre Priebe, Chief Technology Officer at iC Consult, explores the biggest security concerns facing iC Consult customers today, best practices when embarking on an IAM journey, the importance of implementing a holistic IAM approach and One Identity’s key role in IAM success.