Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Advancing the Cyber Community & 'The Last Person' Principle

Discover the power of giving back and strengthening your cyber security expertise in this masterclass. Part 1 explores ways to contribute and foster collaboration within the security community. Gain insights into the field's strengths, identify areas for improvement, and unify and strengthen our discipline. In part 2, learn about the advanced security concept, the "last person principle" to proactively mitigate risks and fortify your security strategy.

AI Biases: Why Achieving Beneficial AI is Challenging

In this video, we delve into the complex issue of AI biases and the challenges they pose in creating a truly beneficial AI system. Join us as we explore the diverse perspectives surrounding the selection of biases in AI models, which often results in different representative AIs even within the same country. We discuss how individuals seek to have their own biases reflected in the AI models they use, or criticize them for perceived biases, highlighting the irony in contrasting approaches between countries like China and other nations. Moreover, we shed light on the elusive quest for objective determination of what's best for the majority, emphasizing the absence of a universally accepted method.

Random but Memorable - Episode 11.0: Fancy Bear Grunge Nostalgia with Scott J. Shapiro

It’s the final episode of the season! Join us for one last action-packed show as we break down all the latest security news in Watchtower Weekly and get nostalgic with a 90s-themed game of Play Your Passwords Right. 💿��🎮🎶 We’re also lucky enough to be joined by Scott J. Shapiro, author of the latest cybersecurity true-crime novel Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks. Tune in to find out more about some of history’s most astonishing cyberattacks and what we can learn from them.

Domain and IP intelligence with alphaMountain and LimaCharlie

With how quickly threat actors move, your network and security teams need additional data to triangulate security investigations and ensure your users are safe. Learn how you can leverage LimaCharlie's integration with alphaMountain to provide domain and IP intelligence feeds for cyber protection based on continuously trained AI models. alphaMountain helps security architects and analysts make better, faster decisions about the risks posed by a host on the internet.

Container Security Fundamentals - Linux namespaces part 1: The mount namespace

One of the technologies used by Linux containers to provide an isolated environment, is namespaces. They are used to provide a contained process with an isolated view of different Linux resources. In this video we look at some of the details of how Linux namespaces work and then take a more detailed look at the mount namespace which isolates a processes' view of its filesystem.