Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Beyond Quick Fixes: Tackling Burnout in Cybersecurity with Systemic Change | Razorthorn Security

This Razorwire Podcast episode tackles the deep-rooted issue of burnout in cybersecurity, emphasizing that superficial solutions like wellness classes are not enough. Discover how addressing burnout requires comprehensive, multidisciplinary approaches that focus on both individual resilience and systemic organizational changes. Learn how poor organizational culture contributes to high burnout and attrition rates, and explore actionable strategies to create a more supportive and sustainable work environment for information security professionals.

Reducing Burnout in Cybersecurity: A Human-Centric Approach | Razorthorn Security

This episode of the Razorwire Podcast emphasizes the importance of a human-centric approach in cybersecurity workplaces to combat stress and reduce burnout rates. Discover how encouraging openness about mistakes and reducing process friction can not only mitigate human risk in cybersecurity but also enhance the overall well-being of professionals in the field. Learn about the benefits of fostering an environment where challenging the status quo and admitting errors are viewed as opportunities for growth and improvement.

Embracing Failure to Enhance Cybersecurity Responses | Razorthorn Security

In this enlightening episode of the Razorwire Podcast, explore the transformative power of embracing failure within organizations to accelerate response times to cybersecurity threats. Learn why fostering a culture that views mistakes as learning opportunities is crucial for rapid adaptation and improvement, particularly in handling phishing attacks—the most common method used by attackers. The discussion delves into how a shift in organizational culture can dramatically reduce the average time it takes to detect and respond to breaches, currently standing at a staggering 287 days.

The 443 Podcast, Ep. 286 - BatBadBut What?

This week on #the443podcast, we cover a research post describing a code injection vulnerability caused by how nearly every high-level programming language runs on Windows. We also discuss a series of vulnerabilities in LG televisions that allow remote attackers to root the device before ending with a chat about new adversarial tactics for delivering malware via GitHub.

Introducing Polaris Assist: Your virtual security assistant | Synopsys

Polaris Assist is a virtual assistant that combines generative AI with decades of Synopsys curated real-world vulnerability, risk, and secure coding data to simplify and streamline application security. Polaris Assist AI capabilities will first be introduced on the Polaris Software Integrity Platform by analyzing static analysis data.

Afni's Brent Deterding on deploying MFA for 10,000 employees and becoming "the Happy CISO"

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Brent Deterding. Brent has over 25 years of experience in security, both on the vendor side and now as a security leader. He spent a big part of his career with cloud-native security analytics platform SecureWorks, and he’s currently the CISO of Afni, a global provider of contact center solutions in the U.S., Philippines, and Mexico.

Shamane Tan on cyber resilience - Cyber Security Decoded

Bouncing back from a cyber incident, data breach or #ransomware attack is a great accomplishment…but how can you bounce forward? A complete Cyber Resilience strategy is mission-critical. Security teams should be proactive and have response plans in place for when #CyberAttacks hit, rather than attempting to prevent attacks from occurring. With a #CyberResilience strategy, your team will be equipped with a plan when a cyber incident occurs while also having tools to identify those malicious attacks before they happen.

Unlocking the Future: Cloud-Based Access Control

In today's fast-paced world, the way we manage and secure our physical spaces is evolving. Join us as we dive into the top 5 advantages of leveraging cloud technology for physical access control, guided by industry expert Steve Van Till. 🌐💼 From remote management capabilities to unparalleled scalability, cost-effectiveness, automatic updates, and reliability, discover how cloud computing is revolutionizing access control systems. 🔑🛡️