Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Entity Collection Overview

The current tempo in information security is getting increasingly faster. We continue to chase quicker detections and faster responses. But does that align with reality? Troves of data is being ingested at wire speed w/filtering, comparing, correlating, identifying, and other transform operations in the event lifecycle. This comes with an increased risk of missed events/alerts, indiscernible log activity from various origins, and the potential for analysis paralysis/desensitization/burnout…

What is an API Gateway?

In a nutshell, the API gateway accepts API calls and aggregates the requests to the various required services. It serves as a bridge between internally used web unfriendly protocols and web protocols that users understand. Though API gateways provide basic API security controls, they unfortunately are not enough to adequately protect your business from API specific threats.

Why Veterans Make Great Infosec Professionals

Infosec is a demanding field that requires individuals to be adaptable, quick-thinking, and able to handle difficult situations. In this video, James Rees explores why veterans are well-suited for infosec careers, with their unique experiences and skill sets making them ideal candidates for the industry. From their ability to handle high-pressure environments to their willingness to take on challenging subject matters, find out why veterans are making a big impact in infosec.

iOS 2FA Setup for Websites and Apps

For added security on supported websites and apps, use Keeper to store two-factor authentication codes. When setting up 2FA on a site or app, Keeper for iOS can serve as your time-based one-time password or “TOTP” generator. This video will review how users can easily add a two-factor verification setup code or secret key from a website or app to a new or existing Keeper record. Initial Configuration Steps

Snyk Workflows - Ignores & PR Checks

Snyk integrates with your IDEs, repos, workflows, and automation pipelines to add security expertise to your toolkit. The “menu” of options available to you is extensive, so we created this three-part series to get you started and running. Do you want your dev teams and AppSec teams to be aligned? The second session of the series digs deeper into using ignore capabilities. You’ll also learn about PR checks. This is a great way to get ahead of permissions.

Hello CISO - Episode 8: Common Sense Security Policies and Bullshit Ones

The best policies for security aren’t always the policies that end up in the company security manual. Why? In this episode, Troy explores the difference between good security policies and CYA security policies… and how to close the gap between the two. Hello CISO is a collaboration between Troy Hunt and the people who build the world's most trusted enterprise password manager. To learn more, visit 1Password.com/business, and don’t forget to subscribe to be notified of new episodes.

Negotiating With Hackers to Unlock Your Data - What You Need to Know!

Are you concerned about the recent ransomware attacks? Tune into this episode to gain valuable insight into the complexities of negotiating with a ransomware group. In this episode, I am joined by cyber security experts, Richard Cassidy and Oliver Rochford, to share their experiences and knowledge to help you understand the impact of ransomware and how best to respond to ransomware groups if you find yourself in that situation.