Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Cybersecurity Burnout and Organisational Culture with Yanya Viskovich & Eve Parmiter

Dive into today's Razorwire episode where we explore the critical issue of burnout in the cybersecurity field. Join Yanya Viskovich, a cyber resilience expert, and Eve Parmiter, a clinical traumatologist, as they provide invaluable insights into combating burnout among cyber defenders. In this episode.

How to Perform Download Disk with BDRSuite

Download Disk allows you to perform Cross Hypervisor Migration (V2V) allows converting VMs from VMware to Hyper-V environment and vice versa, giving you the flexibility needed for variable use cases. Backups can be exposed and downloaded in a different virtual formats – VHD, VHDX, Flat-VMDK, VMDK, or RAW. Restore and attach specific VM Disks to the same/different virtual machine to access the files/folders.

Unlocking Security: Neerja Bajaj's Vision for Open Data Frameworks

Dive into the future of digital security with our latest video, "Unlocking Security: Neerja Bajaj's Vision for Open Data Frameworks." In today's rapidly evolving digital landscape, securing environments has never been more critical. 🛡️🌟 Join us as we explore Brivo's comprehensive solution for managing security in the digital age, inspired by Neerja Bajaj's innovative approach to open data frameworks. Discover how Brivo is leading the charge in creating secure, smart spaces that cater to the needs of commercial real estate, multifamily residential, and large enterprises. 🏢🏠

BDRSuite Overview - Data Backup and Recovery solution

BDRSuite is a comprehensive and most cost-effective Backup and Disaster Recovery Software designed to protect Virtual Machines (VMware, Hyper-V, KVM, oVirt, Proxmox), Servers (Windows, Linux, NAS), Endpoint (Windows, Linux, Mac), SaaS Applications (Microsoft 365, Google Workspace), Cloud Workloads (AWS, Azure), and Applications & Databases (Microsoft Exchange Server, SQL Server, SharePoint, MySQL, PostgreSQL)

Understanding AI Package Hallucination: The latest dependency security threat

In this video, we explore AI package Hallucination. This threat is a result of AI generation tools hallucinating open-source packages or libraries that don't exist. In this video, we explore why this happens and show a demo of ChatGPT creating multiple packages that don't exist. We also explain why this is a prominent threat and how malicious hackers could harness this new vulnerability for evil. It is the next evolution of Typo Squatting.

Revolutionizing Security: How Brivo Leads with Cutting-Edge Tech

Dive into the world of advanced security technology with Brivo, the pioneer in cloud-based access control and smart spaces technology. For over two decades, Brivo has been at the forefront of innovation, partnering with top providers and internal security teams to equip customers with the latest advancements. 🌐✨

The NFL's George Griesler on securing the Super Bowl and reducing risk through collaboration

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by George Griesler. George has been working in cybersecurity since 1997, when he assumed the role of Senior Network administrator at the United States Golf Association (USGA), eventually advancing to Director of Information Security. He currently serves as the Senior Director of Cybersecurity at the National Football League (NFL), where he works to secure events like the Super Bowl, which in 2024 was the most-watched telecast ever.

How to choose the Best Node.js Docker Image

Today we walk through the best options for your Node.js Docker Image, how to avoid common pitfalls and mistakes, and the best ways to strengthen the security of your projects effectively. ⏲️ Chapters ⏲️ ⚒️ About Snyk ⚒️ Snyk helps you find and fix vulnerabilities in your code, open-source dependencies, containers, infrastructure-as-code, software pipelines, IDEs, and more! Move fast, stay secure.

Password Length vs Complexity: Which Is More Important?

In this video, learn about the differences between password length and complexity, which is more important, and four tips to improve password security in your organization. Learn more about: Resources and social media: Transcript: It’s no secret that passwords aren’t foolproof. In fact, the most common way that hackers infiltrate an organization is through stolen credentials. But until the day that everything has shifted to passwordless authentication, passwords are still necessary. So, how can we make them as strong and effective as possible?