During this live stream, we explored the vulnerability known as Dompdf. We looked at what DomPDF is, how DomPDF makes your applications vulnerable, and most importantly what you can do to protect yourself.
This week on the podcast we review our time at this year's Black Hat and Def Con cybersecurity conferences in Las Vegas. We'll cover how the WatchGuard CTF contest went this year and discuss takeaways from a few of the briefings we attended. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.
Mutations within GraphQL are simply queries that modify or change data within the target platform. In this episode, we will cover some of the various mutations available within the Rubrik GraphQL schema, and show you how they can be used to insert, update, or delete data.
At the core of GraphQL lies the query. Queries allow us to fetch exactly the data we need from the Rubrik platform. This episode will dive into how we form basic queries to retrieve Rubrik objects for usage with automation. We’ll talk about how to form a query, create fragments, and pass data into our queries using variables.
Join 1Password senior developer, Nathan West, as he demystifies atomics – the primitive rules for safely interacting with shared memory from multiple threads. Nathan shows that, while complex, atomic code really is possible to understand. He discusses the C11 memory model, atomic and nonatomic operations, and memory orderings. Nathan also provides insight and clarification on the often-confusing concept of each thread having an independent view of the memory.
With the launch of Rubrik Security Cloud, a new way to interface with Rubrik APIs has been introduced, GraphQL. In our first episode, we will dive into why Rubrik chose to implement GraphQL endpoints, and what the difference is between our RESTful APIs and our GraphQL APIs.
In our micro webinar series, UpGuard Sessions provide you with a quick dive into the most timely topics in cyber security that will help you with third-party risk management, discover potential vendor risks, and comply with regulations. Interested in finding out more about UpGuard?
Protecting your data as it moves through data pools and warehouses is critical. Protegrity’s partnership and integrations with AWS allows corporations to improve continuous data flows with Protegrity Cloud Protect for S3.
Despite the steady drumbeat of news stories on security breaches caused by compromised credentials, 70% of teams still use secrets such as private keys or passwords to grant infrastructure access. In this webinar, we’ll cover why all forms of secrets are bad for you and your business, and why MFA is not good enough. We'll cover how the adoption of Passwordless Authentication and related hardware technologies like TPMs and HSMs fix a slew of problems, including making phishing attacks a thing of the past.
Empower your agency to take advantage of all the productivity and collaboration capabilities the Microsoft 365, Teams and SharePoint Server have to offer with zero trust ABAC powered information security from NC Protect.