Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

2023 Top Routinely Exploited Vulnerabilities | Threat SnapShot

On November 12, 2024, a joint cybersecurity advisory was released by agencies from the United States, Australia, Canada, New Zealand, and the United Kingdom. This advisory highlights the **top routinely exploited vulnerabilities of 2023**, offering insights into persistent threats and the measures organizations can take to protect themselves.

How to Install BDRSuite Offsite DR Server on Windows

Welcome to the BDRSuite How-To Series! In this video, we'll guide you through the process of installing the BDRSuite Offsite DR Server on a Windows machine. Whether you're setting up for the first time or reinstalling, this tutorial covers everything you need to get BDRSuite Offsite DR Server up and running smoothly on your Windows system.

AI Governance and Global Cyber Resilience

In this episode of CISO Conversations: EU Data Regulations, Richard Cassidy, EMEA Field CISO at Rubrik, is joined by Anu Bradford, Professor of Law at Columbia Law School, and Bronwyn Boyle, Chief Information Security Officer at PPRO. They discuss the importance of resilience and regulatory compliance as critical factors for organizations to manage their cyber threats and bolster cyber defense.

How an Integrated Strategy Solves Modern Cyber Challenges and Prepares for Tomorrow

In today’s rapidly evolving digital landscape, organizations face increasingly sophisticated cyber threats and a siloed approach to cybersecurity is no longer enough. In this video, David Morimanno, Director of Identity & Access Management Technologies at Xalient, explores how an integrated cybersecurity strategy can address modern challenges and future-proof your organization.

Founder's Corner: Episode 3

Welcome to Episode Three of Salt Security’s Podcast Series: Founder’s Corner Salt’s CEO and Co-founder, Roey Eliyahu, talks with Salt’s CMO, Michael Callahan, about the first step of the customer journey in API Security: Discovery (also known as the crawl stage). They dive into topics around Discovery (as well as Salt’s phases of Discovery), Data Security, Shadow and Zombie APIs, GenAI, and how Salt is utilizing AI.

Dell's API Security Failure: How 49 Million Records Were Exposed #dell #DataBreach #dataleaks

In this video, we examine two significant API security failures, each with devastating consequences. The first breach used a simple trial-and-error method, exploiting broken access control to impact 10 million users. In the Dell example, API abuse exploited a lack of validation and rate limiting, allowing an attacker, posing as a partner, to scrape 49 million records over several weeks. These cases highlight the importance of robust API security practices, especially for business processes and access control. Watch to learn key takeaways on protecting APIs from similar attacks.